Skip to main content

归之前401k怎么处理阿

http://gengwg.blogspot.com/

以下是引用Emichan在2009-4-14 10:12:00的发言:


       
401k是不可以直接rollover into Roth的。你要先rollover 401k to a traditional
IRA, 然后再convert to Roth。401k -> traditional 是没有税也没有罚款的。Traditional
-> Roth要交税,就是你当初的contribution的那部分加上后来的盈利。

       

        如果是tradition -> Roth,你的AGI不可以超过100k。

       

       
 以下是引用margaretni在12/17/2011 7:55:00 PM的发言:
离开公司后先从401k转到IRA,然后一点一点(每年3200 examption)转到Roth IRA里面,这样就免税了。Roth IRA里存满5年的钱取出来就不要panalty了。


以下是引用windysnow在4/14/2009 10:11:00 PM的发言:

   
      查了IRS publication, 从08年开始,可以从401K/403b  roll over to Roth IRA without penalty. 只要交税

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...