Charts - Charts - Charts! It's Friday and I just wanted to post a few charts that look interesting . I am not talking about buying and holding for a month, some traders dont even like to hold over the weekend with Greece and other geopolitical issues out there. Today I am talking about what look like trade set ups / reversals and so on. Buy one or two , or put these on your watch list to possibly buy a pull back . We had reversals yesterday in OIL & Metals. I liked them because they can be trade-able. I bought as mentioned in the chat / comments area, but is it long term or short? Just a quick trade or more? I'll discuss that this weekend. On to the charts ...
$WTIC- small bounce or lows?
What about NATGAS?...Read More
CRAZY, right? What a difference a day makes. Traders that jumped from Long to Short on Tuesdays drop have likely been burned, and that may or may not change going forward. Lets take a look...
SPX WKLY- I love this. 🙂.
This weekend I showed this weekly chart.
1. Possible top Friday
2.Vix at lows
3. SPX Wedge , so I said to expect a drop.
SPX WKLY - Monday was a holiday, so this is the wkly after Tuesday & Wednesday. The drop & recovery - Boom, Boom.
On a daily - you cant even tell anything happened.
It has been an amazing 2015 for Robert and the Chart Freak site. Since going live, we’ve had a consistent stream of really great winners too. And in celebration of our 6 month Premium Site launch anniversary, we’re offering our first and only promotion to date for those wanting to try out the Chart Freak service.
Until Monday night ONLY, we’re offering 20% off the purchase price of a Quarterly membership. A 3 month membership is normally $95, but if you use COUPON CODE: SAVE20 on the checkout page, the price will drop to just $76 for your first 3 months.
And by popular request, as of today, we now accept PayPal on the site. This promotional offer is available to PayPal users too.
Robert has been posting around 100 charts per week covering a wide array of sectors. Come join our community and see what hundreds of loyal members have been raving about.
It certainly looks obvious that various sectors are starting what could be a significant decline. I pointed out the VIX and the elephant in the room last week, indicating that one should be coming, it was just a matter of time. Lets look at the charts ...
In this chart of the VIX I was pointing out that tops (maybe just temporary ones) often started with the Vix in the 12-14 area. It also did a reversal Friday
So this is what has transpired...Read More
I was away from my desk Friday and upon returning to the charts on Monday, I am seeing some changes that I want to discuss. Lets start with our regular market review. Lets take several views of the markets, both bullish and bearish, while remember that ELEPHANT IN THE ROOM discussed here last week.
But we keep this in mind too as we remember that Elephant in the room...Read More
Can we talk about the elephant in the room for a minute? Not the one seen above, I'm actually talking about the one below . Notice how the Trannies sideways move has lost strength & momentum.
IYT- Zoom in and see the break down in the IYT
How can this be in such a strong market. Buy the dip mode is in full force, right?Read More
I want to review the market moves from yesterday and their possible implications. WIth that I am also keeping in mind the FOMC minutes will be released at 2 p.m. Eastern today. That has the possibility of shaking things up at times.
My SPX thoughts are bullish, as shown in yesterdays chart. The SPX 'paused' yesterday after breaking to new highs.
That said, I want to point something out that could weigh on the markets too...Read More
What happens if I am conditioned to see an egg sink in water, and then I see one float? I think that I would want to try to understand what the difference is. What has caused this change. Sometimes in the markets we also get accustomed to seeing something occur, but when the opposite happens, I like to try to understand what has changed. We'll discuss this later in this report, for now...
The SPX has broken to new highs! If this pattern plays out, it has room to run.
Look at this next chart below , and compare it with the SPX. I posted this April 29 and you saw what happenedRead More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.