I really like the way things are stacking up, it seems that some nice opportunities are approaching. Lets look at some charts and you'll see what I am talking about.Read More
Things seem to be playing out as expected, but that still leaves a few unanswered questions longer term. Lets look at some charts...
$USD - the pullback has acted exactly as expected (So far)
The weekly chart of the Dollar has been very strong...Read More
Often my Thursday report covers Thursday and Friday, leading into the Big Weekend Report, but a lot happened today, so I wanted to put out a Friday report. After a large drop Wednesday in SPX, DJIA, NASDAQ, IBB, etc , I felt we were right on target with the series of charts showing the Wedge Pattern, but were we about to slam right through it and break down? It looked it ...
Today, we saw this in many markets...Read More
We re-entered Energy/ OIL stocks for a while waiting for Oil to POP. It really popped yesterday and overnight too, thats a perfect reminder that patience pays off if you're looking at the charts correctly. Gold & Silver Popped overnight and we'll discuss that, there is a Bullish and a Bearish Scenario that I have been pointing out and believe it or not, both are still possible. Then I have one more important reminder to point out. Lets get to the Charts...
This was my NASDAQ BEARISH WEDGE - from yesterdays report
This is the NASDAQ chart after yesterday...Read More
Lets discuss the overall markets and then I'll tell you why I am looking for clues...
QQQ - Not much has changed, this takes time to play out, this was March 23
So we look at what happened since then...Read More
Not a lot has changed since the weekend report, so lets just look at some charts...
March 20 - The NASDAQ looked due to pullback
SO did it start to pullback, and if so, how far is it likely to do so?Read More
As expected , the Fed Mtg Wednesday caused several areas of the market to really start popping. There is so much to cover this weekend, so lets get right to the (29!) charts...
Starting with IWC - As pointed out over the past several weeks, This is a bullish looking set up
Another Bullish looking set up is he following chart...Read More
In this past weekends premium report & again on Monday March 16th, I posted developments that we had been watching In OIL/ENERGY /METALS. I am going to share a small part of those reports here with you , and let you draw your own conclusions.
MANY went short OIL this week . The Wall Street Journal , CNBC, and several other letter writers warned of an imminent breaking down of OIL to the low $30’s. So when People saw OIL break to new lows- they got very bearish & shorted it. I like to check the charts and see if they can tell me something about what I am seeing. I noticed that in 2008 when OIL was attempting to bottom, something similar happened, so I posted this chart for my readers.
$WTIC 2008 – Notice how OIL struggle under the 50sma, then made a false break down to new lows. How many went short then?
$WTIC Friday March 13- Struggled under the 50sma and then it gave up. ( It now has dropped to new lows this week). Many went short.
Going one step further I asked myself,
“Are ENERGY stocks breaking down to new lows too? Do you see any reversals in ENERGY STOCKS?”
Check out SM – no new lows, it just ran from $30 to $50
From Mondays Update: Look at REXX, EXXI, ( And I pointed out others) I wrote…
I may be early, but I took a couple smaller positions in EXXI, REXX , because I can place a stop below todays lows and they are bullish engulfing with OIL at new lows.
I concluded by also mentioning that with OIL at new lows, the XLE was looking rather bullish.
Reversing while OIL is at lows is also the XLE.
This is the XLE today as I write this (March 19)
But wait. In that above XLE chart, I see ENERGY bouncing , and then dropping, bouncing and then dropping. Is there any safe way to trade this? Will this be a lasting type rally this time, or will it roll over again and again as it has in the past? I will be covering that in this weekends premium report.
GOLD/SILVER and the MINERS were also due to bottom. It was a tough one to read. They also Popped with the FED WED release. I had posted this bullish set up March 11 in Silver , but again will it pop, run , and last? Or roll over?
$Silver – Ran the stops and this was the low.
I’m watching a variety of sectors and seeing what looks to be an interesting development taking place right now. Stay tuned for more information as these developments unfold. Thank you for reading along, I hope this article gives you a few new ideas to think about, and best wishes in all of your future trades!
If you were watching the markets yesterday, then you may have seen something quite interesting from about 2 P.M. onward as the FED information was released. It looked like this at a casual glance....
The $USD completely wiped out any gains from Jan 22 onward in very short order. Oh these fickle markets ...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.