I dont always see the need to post Friday , because Thursdays report covers my expectations and Friday usually doesnt leave me with much to say until the big weekend report. Today I just felt the need for a quick update because 2 questions arise...
1. Has anything changed?
2. Do you want to hold over the weekend? QUICK commentary
$NATGAS - The "Floor" broke down. May just be a 'test', but you should be out
SPX/QQQ/DJIA ...Read More
You can just Re-Read yesterdays report on the General markets , and then come back here and see how much clearer it looks with the charts supplied today. Yesterday I was saying that Futures where up , but could it last? ....
Well, Let me just start with a chart that I posted yesterday ...
Now check this out...Read More
(This report was written Tuesday night )
Warning, this report goes against " common group think" Why? Well , I want to show why slowly but surely it looks like the "Buy The Dips" crowd may be exiting the building and the next few charts may be proof. AAPL & YHOO had pretty good earnings, can they save the day? Or will it prove to be just another bounce? We shall soon see, but it's also another F.O.M.C. Wednesday and as you know...anything can happen after 2 P.M. Eastern time! In the meantime, lets glance at a few charts.
MSFT - Oh she used to be a wall street darling. This is a Weekly chart and so far the volume is HUGE for 2 days.
Is that just a fluke? A one bad amongst many beauties? ...Read More
Due to the Storm approaching New England, I may lose power ( As mentioned in my wkend report), So I want to share a few possible trade ideas for you to watch , in case I wont able to post anything tomorrow. Let me start by showing you an Energy stock that got taken out to the whipping post. It is beaten down and double bottomed. It seems like all of the downside ( At least for now) has been met. Risk reward is skewed toward less risk (Using stops) and more upside potential if conditions play out. Some of these stocks could just "Bounce" and do very well.
EXXI WEEKLY - Double bottom with a MACD cross?
Why would I call it low risk though? Isnt it high risk, in danger of getting cut in half again? Well, consider this...Read More
Have you ever seen Black Ice? living in New England I've seen it a lot. It looks like solid dry black pavement, but Suddenly you see someone walking along and Whoosh! , their feet fly out from under them and they are flat on their back. Invisible Ice. Well on occasion, I've seen something similar occur in the markets. You're going along and all things look solid and safe when suddenly...Whoosh! things slip away. I want to mention this now and first off, so that THAT image sticks in your mind when I cover the weekdend report.
Our recent consolidation that was looking a little Bearish in many ways (as shown in prior reports) Got Draghi juice and suddenly looks a little more normal. This is the SOX index on Friday
Does that mean we'll break out in Bullish fashion soon? ...Read More
I have to be honest, I was recently looking at the markets and thinking that the apparent weakness was going to prevail. Recently I've been staring at the SOX and something is starting to pop out at me. let me explain...
I had mentioned to my readers back in DEC that I thought I saw internal weakness in the markets. As the markets began to weakly bounce & Roll over, I then posted this chart JAN 6 and mentioned that though I expect a bounce here, I thought we may 'fail " at the 50sma. BUY THE DIPS might not work, and possibly a short set up .
By Jan 21 the weak bounce had played out, I began to think we may get a good shorting opportunity, but wait for that ECB mtg.
But then I saw those SOCKS! No, not the multi colored array of Socks above, I mean ...Read More
Did you see the $USD? Did you see the QQQ's? Did you see $Gold? Looks like "Happy days are here again" ? Well the markets certainly did react strongly after the ECB announcement, but will it last? Can it last? It really raised more questions than it answered, so lets look at some charts.
SPY - Which was struggling below the 50 sma got a bit of a boost yesterday
In some ways , the 3 Q's looked even a bit better...Read More
Many times when markets move , they are often setting up for the next trade. As things are setting up , Its not always possible to tell if the set up is Bullish or Bearish. I have mentioned here what I am seeing in the markets, but with the ECB meeting taking place and the results of that meeting not being released until (supposedly) 8:30 Eastern time, the goal is patience. Often traders & investors dont realize that over trading can cause one to slowly give back the gains recently made. So while we need to invest to make money, we also need to learn patience to be able to avoid knee jerk reactions and head fakes. While we wait....Quick review.
NOTHING has changed with the SPX,QQQ,DJIA, etc
Like yesterdays report 'Groundhog Day" mentioned, as time goes on, not much has changed. One thing I did notice is...Read More
I feel like I'm living in that movie Groundhog Day, where you wake up and though some things continue to change, its just a repeat of yesterdays events. The equity markets moved a bit , but its the same old movement, and leaves me with the same conclusion. As for GOLD & Miners, NATGAS, and Oil? I am expecting changed that I will discuss here.
First lets look at the SPX as of yesterdays close
You can see that we are getting the same movement as expected and ...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.