Skip to main content

谈谈自己的交易理念

作为一个想追求长期稳定盈利的交易者,无论是股票,期货,外汇,任何类型的交易,都要做到两件事,

第一找到你自己交易的优势,第二是坚持交易。除了这两件事外,再没别的了。

交易优势就是你相对于这个市场中大多数人有特有的优势,无论是技术,消息,心理。如果你精通某种分析技术,能恰当的使用;如果你有内幕消息,可以提前买入或者卖出;如果你洞悉人性,能在期间游刃有余;这些都可以成为你的优势。不同的优势就有不同的操作策略。任何股票货币商品在任何价位都有卖有买,都有各自的理由。只要找到你自己的理由,你自己的优势就好。这个优势的稳定性,决定你交易的可重复性和长期可行性。比如技术分析,某种技术刚出来时,用的人少,具有短期优势;人多了,优势就会降低。相对于技术和消息,人的心理模式和行为具有更长期的稳定性,这种心理和行为可能需要很久才会改变或者根本不会改变。

坚持交易,就涉及到交易纪律和资金管理了。再完美的策略也需要完美的执行,才能发挥作用,长期盈利。资金管理就一句话,让自己的资金生存下去,在有优势的基础上长期交易下去。

也许有一天,你会发现交易其实很简单,没什么深不可测。

我交易的时间不算长,不敢展开细节的讨论。略有些感悟的是,做交易是修炼心性的好地方,交易如人生。一个人想做成一件事,一定要在这件事上有相对于大多数的人优势,无论你的智慧,你的力气,还是你的胆量,然后就是坚持。这个交易优势寻找的过程,需要你的努力,这就是修炼的过程。如果你没能在交易中找到,要及时的“止损”,试着发现自己其他的优势,也能取得成功。条条大路通罗马,没必要非靠交易发家致富。人的一生都是在“交易”,每做的任何一件事情,都会产生正负平三种结果。要想人生具有正期望,就要从每次“交易”入手,让每次“交易“具有正期望。

最后一句,做人做事做交易,都要勿以善小而不为,勿以恶小而为之。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...