Skip to main content

标 题: 从投资角度,湾区哪里最有潜力?

http://gengwg.blogspot.com/发信人: yuckeye (Yuckeye), 信区: SanFrancisco
标  题: 从投资角度,湾区哪里最有潜力?
发信站: BBS 未名空间站 (Sun Feb 15 19:25:45 2015, 美东)

长远来看,房子这个东西不会亏,因为土地永远是有限的。这里想开个帖子征求下大家
想法,纯从投资角度,湾区哪里的潜力比较大? 一下是我个人观点,轻拍,同时欢迎
诸位发表自己意见。

1) 湾区的重心逐渐往北迁移

很多公司新开的office都会选择sf downtown,因为现在的年轻人喜欢那种city life。
一个我知道的例子是linkedin在sunnyvale搞了个楼的,说是去年8月就要搬进去,但是
一直没动作,不知道现在怎样了。同时他们又在sf downtown搞了个楼,说是会迁到那
里去。他们hr出来说过,他们发现在那里容易招人。

2)新移民更注重交通便利

最近房价大涨的时候,los gatos, saratoga涨幅不如sunnyvale,mountain view这些
。我觉得很大原因是以前湾区人没那么多,车没那么堵。现在大家都想离公司近。


综上,个人觉得半岛,学区已已经比较好的区域,是潜力最大的。诸如burlingame,
millbrae。这些地方,train,bart什么都方便,又有比较fancy的downtown,新移民回
国什么都比较方便。双职工南北分离的问题也得以解决。

大家怎么看?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...