This weekends report talked about "Drops", because many markets like the Shanghai and even our own markets recently encountered them. I mentioned that after a drop, their often comes a great opportunity and now the equity markets were rallying. Gold has entered its cycle timing to put in a low after it finishes its current drop too. What does that mean? It means we should discuss RISK, as we approach what I think is going to be an excellent buying opportunity in the precious metals area. First lets review the markets...
NASDAQ - We have rallied nicely out of the ICL as expected. We are outside the Bollinger Bands (not shown) and we could get a pause here sideways, or even a pullback. Notice that eventually all break outs get tested.
Interesting thing about the chart of the SPX...Read More
Seems that lately we've been hearing a lot about "Drops" in the markets. Remember when CNBC was reporting that Shanghais drop may never end until it hits the lows again? Its collapsing! All drops end, and this one looked like it may just return to the break out.
And the stock market itself just had a drop, blaming the concerns of China, Greece , etc as the problem. Lets discuss these drops since GOLD / MINERS starting dropping rather rapidly last week too. Will it end? Of course. Where and when ?? Lets discuss drops ...Read More
Just a quick note for today ...Read More
Lets talk about timing.
So far the markets are acting as expected for an equity market that has found its ICL. The Excessive Bearish sentiment , Put / Call Ratio extremes , the Vix and Various set ups pointed out here in early July were all calling for a contrary reaction. Not what the crowd would expect. I expected a rally, but waiting for it each day seemed like time was being warped. I still see the Precious Metals under similar circumstances, but as you wait for an inverse reaction , it seems like each day is a week. Lets review this thinking.
Here is one of the many charts that I used to say that I expected a meaningful low in the equity Markets. This was July 6th. Extremes comparable to OCT & Feb lows were in place, but when would we see a rally?
SPX July 15 - Notice that after July 6th, we dropped to new lows July 7,8,9. Three days felt like forever, but now they are forgotten. The rally continues to have follow through.
Keep the above in mind, and we'll discus it further in the report.Read More
Below are just a few trade ideas.
We try to find low risk set ups and entries. To ensure that the risk remains low, we use reasonable stops and honor them if the trade goes against us. Being wrong is OK, it will happen from time to time. Staying wrong can damage your account.
WIX - Just broke back above the 50sma again. Your stop would be under the 50sma.
GPRO - re-gained the 50sma, but gapped open. You may want to wait for a break out above the blue dotted line
Continue on...Read More
Hey, it did happen a few yrs ago, but now that I have your attention 🙂 I need to review something in the GOLD - SILVER - MINERS section of this report. First a quick review of the markets.
As expected , Follow through in the DJIA, SPX, NASDAQ, etcRead More
When the markets are volatile and choppy, it can be difficult to buy and hold a position for anything more than a day or two. We have had some very choppy markets lately. The good news is that the current set up that I am seeing in the markets currently may provide an opportunity to 'SHOP' with a little less "CHOP".
SPX - The blue lines point to the type of run I think we will see. We may have a pause or two, but I expect higher prices.Read More
** This report contains excerpts from the GOLD & SILVER section of my premium report this weekend.
After doing a lot of research last week and this weekend, I am thinking that we could see a very trade-able low in Gold & Silver, and very soon. Almost all of the letter writers and gold reports that were out there were saying that Gold would crash to $800-$1000 this spring. My readers know that I maintained all along that I did not see that happening (yet). 🙂
Lets look at The USD , GOLD & SILVERRead More
This report covers a lot, especially when we get to the precious metals - Gold, Silver, & Miners part, so lets just get right into it..
SPX - It has been a very volatile market, but let me discuss why I am getting signs of a meaningful trade-able low here (or very soon).Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.