Skip to main content

今天去购物,通胀很可观了,加息势在必行

 发信人: skybluewei (weilan), 信区: Stock
标  题: 今天去购物,通胀很可观了,加息势在必行
发信站: BBS 未名空间站 (Sun Jan 23 15:18:30 2022, 美东)

我是家里负责购物的,去年总体其实还好,物价涨了些,但不是普遍的。去年底到现在
,物价普涨了。这一段普涨,主要是因为年底这波疫情,不仅仅是国际物流,美国本土
物流也出问题了。一旦进入恶性循环,就很难控制了。

疫情无论怎么弄,都是这样,确诊了阳性了,上班还是不上班?打工的,雇主,学校幼
儿园,所有人都难做。因为新冠还没有退化到普通感冒的地步,就算普通感冒,也得给
病假,至少还有几个月到半年的混乱时期。

现在其实是滞胀了,经济并没有恢复,通胀是实在的,恶性通胀会抑制消费,进一步导
致经济下行,美国是消费行经济,不像某些国家还有出口可以拉动经济。FED没有办法
,必须要加息,甚至缩表。不仅股市,还有经济,短期甚至中期都不看好。投资很难做
,国债利率不够高,被通胀吃掉,股市由于经济不好了,流动性减少,也会低迷不振。

--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...