Skip to main content

炒股票还是要学巴菲特

发信人: wadaxiwa (洪福齐天), 信区: Military
标  题: 炒股票还是要学巴菲特
发信站: BBS 未名空间站 (Mon Feb  5 22:11:56 2018, 美东)

第一点,不能贪,不能频繁买卖

特别是我们这些小人物。不能贪得无厌。

炒股票就是持有个十几二十年,或是买index fund。只有这样,华尔街的庄家才搞不到
你头上。

散户再聪明,也斗不过华尔街。你不陪庄家玩,庄家一身的本事,也拿你没办法。

就像前段时间比特币。我老就是打死不买,你发财我不眼红,你就拿我没办法。


第二点,不要time the market

很多人说早知道上星期应该怎么怎么样。这是一句废话。话又说回来。你根本就猜不着。

索罗斯去年做空几次都没成。你比索罗斯更NB?

还是那句话,你不陪庄家玩,庄家就拿你没办法。非暴力不合作。


第三点,炒股票要讲费效比。

你累得个半死,最后还没多捞到几毛钱。很多人还把底裤都给赔了,何苦呢。
还不如把时间省下来享受生活。
要学会尊重自己。
炒股票对人身心压力很大。自己也是人,要善待自己。
治大国若烹小鲜。炒股票也是一个道理。买了股票就不要翻来覆去的折腾。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...