Skip to main content

标  题: Re: 房价涨 租金平 看不懂 有点动摇了

发信人: xiaonurse (trytry), 信区: SanFrancisco
标  题: Re: 房价涨 租金平 看不懂 有点动摇了
发信站: BBS 未名空间站 (Mon Feb 13 23:15:47 2017, 美东)

看着楼主都累,对于普通人来说timing the market is a HUGE mistake.对于普通人来
说股市上就是buy index and hold. 房子就是,在工作比较稳定的前提下,尽可能早买。

什么拐点啊,什么crash阿,巴菲特都预测不了,你操那个心?说不定再涨一倍再crash
你怎么办?

如果是长期持有,不确定性就很小,股市任何15年投资回报都是正的,30年平均都有7%。

房子一般跟着通货膨胀涨,但是加上杠杆(你只20%本金),收益也不错。

买房子亏钱的只有两种情况,第一,买的地方人口大量涌出,第二,自己丢了工作迫不
得已在低点把房子卖出。这两样都不是人为可控因素。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...