Archive for year: 2015
As this trading year wraps up, I plan on using the weekend report to discuss some ideas of what we may expect in 2016. We have 2 trading days left this week and then it's on to 2016. Lets review what the charts are saying...
DJIA - So far the Dow has made lower highs since May. We are at resistance and may drop back down to the lower support. If this breaks out and runs to the blue dotted line, it will be the first set of higher highs.
There are several interesting things to look at here...Read More
If you are wondering why I chose the above picture, I'll explain that later. Right now we have the markets in limbo, Natgas on Fire , and Precious Metals seem to be searching for a catalyst . Lets do a review....
NYA - I thought it was interesting that the NYSE looks a tad more bullish than than the SPX or NASDAQ short term. It had a MACD cross higher 2 days ago, while the SPX doesn't (yet). It almost resembles a bullhorn pattern.Read More
Over the past 2 months I have received one specific question about Gold , Silver, and Miners often enough to know that it's important to the readers here. Even though I answered that question in separate emails, I have already done the homework, so why not share it here in the weekend report to benefit everyone? First, a market review....
SPX - This is the area that I have been pointing out for the markets to prove themselves.
Now a look at the SPX WKLY chart...Read More
I'm actually looking forward to the weekend report. This week is playing out as anticipated for the most part, so this weekend I will point out some more of the bigger picture things that I have been looking at.
SPX - This climb is heading towards some resistance. We have Wednesday and a 1/2 day Thursday, do you think this will be able to break out higher on a 1/2 day of light volume holiday trading? Hmmm?
Look at this weekly chart of the SPX ...Read More
The holiday week has many people checking out early and preparing to spend time with families. That means that this can be a week of slow trading, but that can also set things up for the next directional moves when traders return to work. Lets see what happened on Monday....
SPX - Bounce today. Will it blast off higher? See the wkend report.Read More
This is one of those weekend reports were there was a need to dip deeper and investigate several areas of the markets. Why? In the last report you may recall that I discussed how the recent trading reminded me of riding the White Water Rapids. For example the SPX was up about 75 points for 3 days heading into the Fed Mtg, and then it dropped down about 70 points for the next 2 days. Gold rallied with the Fed Wednesday , sold off Thursday, and rebounded Friday. Is there a waterfall ahead, or will this river smooth out? Lets dig in for clues as to what may lie ahead..
SPX - I posted this wkly chart to show 'weakness' in the indicators that I was using. This would indicate that more downside was likely.
Take a good look at this chart of the SPX. Later in this report I will explain why it is important...Read More
If you have never been white water rafting and wondered what it would be like, you just experienced it if you have a position in the markets. Quickly climbing up one white wall and then splashing down the other side, it gets tough to hold on and tough to navigate. One cold splash after another, sometimes people are even tossed off. That may not be a bad thing, because when rafting in uncharted areas, there may or may not be an unseen huge drop off up ahead. Lets take a look at the markets, and I'll point out what I see..
Note : Today is Quadruple Witching. We will probably have some high volume moves today.
SPX WKLY - The weekly chart broke back below 2 key support areas and the blue line needs to hold here at 2000.Read More
We finally got an interest rate hike out of one of the 2015 Fed Meetings. It appears that various market sectors seemed to like what they saw. Lets review....
SPX - The SPX looks Bullish, but I do want to share both a bullish and also a bearish version.
This is the bearish version...Read More
On a day like today it feels like there is so much to say, yet what can be said? Lets do something a little different today. lets look at what happened on OCT 28, the last Fed Mtg..
SPX- After Janet finished speaking, the SPX closed higher (Red Arrow). It paused for 2 days, and then had 2 more up days and that was The Top. That Fed Wednesday was exciting, but it was rather short lived when you look back at it.
This is interesting...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.