I have been watching the various markets intently , examining internals and how they've reacted under similar circumstances in the past to try to get an idea of what to expect . I think that I have done rather well with the general markets and Metals and miners, but I must say...there are some extremes in some areas that I have just left alone until I get a clearer idea of how things may unfold going forward. What am I referring to? Well, specifically the ENERGY sector with OIL and NATGAS has been a little tricky, and of course the $USD has been very strong - now even higher than I anticipated. lets take a look at those areas. They that have been difficult to call, for Sure.
I know what I "Guess" they could do, but when it comes to putting advice in my premium reports on these sectors, I have decided to just wait until things clear up , and focus on some other very trade-able areas.
I expected the $USD to stop in the $92 area. ( Actually, I had that as a target, but I thought it may not make it there, I mentioned that it could roll over near 91 because GOLD began completely ignoring the $USD strength. I assumed GOLD was sniffing out Dollar weakening).
I posted this chart Jan 2- $92 target
Then on JAN 5 , I noticed this ...Read More
You could basically read my last few reports and get the same results. Even though the numbers have changed and the moves are taking place, my outlook hasnt changed.
Here is yesterdays wkly chart of SPX - we expected a move higher, but a bounce or a buy the dip recovery?
I thought that the markets looked a little 'different' this time, so I mentioned that it could 'fail' . Yesterday we did have a reversal
And CNBC had a lot of people on saying, "You just have to Buy the Dips. Its been working for years now! " Is THAT what I mean when I say nothing has changed?...Read More
Markets dont go straight up or down
( yes I've seen the $USD and Oil Lately ) Well actually, they haven't been 100% straight up or down either. We expect Pullbacks , consolidations, dips, etc . Even the straight up dollar move wasn't straight up , as you can see here in my Jan 2 chart, there were dips ...
Pullbacks happen all the time, and the key is to examine them separately and look for opportunity. Lets discuss pullbacks ...Read More
Many still cant see it , lets zoom in for a minute
If you're worried that the public will see this , dont. I have posted for 8 weeks my thoughts on a particular sector in extreme detail, and I still cant convince everybody of what I have been seeing, this Picture wont change anything for the public. So Lets discuss Various Markets ...Read More
Friday was a Mini victory if you ask me, and I'll tell you why after a brief update of the markets. So far The SPX, Q's and Dow acted just as I thought they would, they have dropped after making new highs (QQQ was likely not going to make new highs, and it didnt ). DEC 30 - I posted this that I'd be watching the QQQ's at the 10sma, it looked weak.
Well, it broke right through the 10sma by the end of Dec 31, so what now? All doom & gloom from here?Read More
Real Strength and Real Weakness.
In Humans , sometimes strength & weakness can show up as obvious, seen by outward appearance alone. In some cases, however, it may require an X-Ray to peer inside and see how the internals are doing. Its really the same with the markets. A Rally can appear strong, and yet inside it may show evidence of weakness , and visa-versa can be true too.
I know many felt that the year end 'Santa Rally ' , as it is often called at the end of the year, looked like a strong continuation of the rallies that we are used to seeing lately. Here at Chartfreak, I was mentioning to my premium readers that under the microscope, the rally looked to be weakening to me. I thought that we might actually see some rolling over and possibly even some selling into 2015. For how long? We will know soon enough, but notice what I was pointing out to my subs last week.
THE SPX was falling short in some of its 'internals'- It looked weak to me as it was breaking out. I thought it might actually roll over after breaking to new highs, like it did in September.
SPY NOW ( Broke with weakness & fell back)
To me the QQQ looked even weaker...Read More
During times of low liquidity, it's easy to rock these boats back & forth , but it's not always easy to get them sailing smoothly in the intended direction. When the tide rises , or the flow of liquidity returns, however, they can begin a journey of smoother sailing . During weeks of holiday trading, its similar in the markets. low liquidity can cause volatility and rock things back and forth, but it's not always clear which direction things really want to flow.
Today is January 2, and it's the first trading day of 2015, but I'm not so sure that the liquidity will return until next week. Until then ,we may have more volatility and things may not look very clear, but there are some interesting developments to look at. As I write (Pre-Mkt) Futures are up nicely for the DOW, SPX, and NASDAQ, while GOLD shot down to $1169 , Silver is down .10 , and OIL has dropped to new lows. The $USD is again strong, up to $90.85! I still think next week will clarify the true direction of these markets, but notice this...
The dollar is at new highs in Pre-Mkt at almost $91., yet Even with the continued Dollar strength...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.