Lets review last weeks market action by stepping back and looking at the bigger picture.
SPX - This long consolidation has left price right where it was in Jan. The MACD is dropping steadily on the weekly. This is a reversal candle so we may see a bounce this week.Read More
After a solid 5 day rally, gold sold off on Thursday, and the precious metals miners were sold-off indescriminetly. Both GDX and GDXJ were down almost 6%, leading many to be shaken out of position on the pullback. For me, these events are expected and become opportunities, so lets examine the charts to see why.
$GOLD - a pullback to the 10 & 20 sma as support is normal.Read More
Thursday saw Gold sell off a bit, but Miners were really shaken. Both GDX and GDXJ were down almost 6% . We were buyers last Friday and Monday, so should we be stirred by this selling? I do not think so. We will honer our stops if necessary, but lets check the charts for confirmation.
$GOLD - a pullback to the 10 & 20 sma as support is normal.Read More
I have good news and bad, but the bad news isn't really all that bad either. The good news is that we have done a great job of pinpointing and navigating the lows of what appears to be an ICL ( a deep meaningful low) in the precious metals market. The bad news is that we now have to navigate the upside and as you will see, its a bit trickier than many may expect. Lets quickly review the markets first.
SPX- This has been no picnic for investors either. The SPX is basically flat for the entire year. Strong sell off and reversal yesterday, but can it break to new highs? It needs to be monitored. A break below the July lows in the next few weeks would be very bearish in my opinion.Read More
There is more than one type of Gold Watch. The obvious one is the one that you carry around to tell you what time it is. The Gold Watch that we have been carrying around here at Chartfreak is the one where you closely watch Gold and gather clues about its next possible trade / rally. We were very prepared for what is unfolding currently. Let me share with you some of the charts I’ve used in the past week to prepare readers in the premium section of my reports this way.
The general markets could be a little “Toppy”, so I pointed this out first.
Aug 3 I reminded readers that the Semis were sagging
Earnings were disappointing. If the markets drop , maybe the metals would Pop? I showed charts of DIS, GMCR, TSLA, VIA, etc
AUG 5 – Many thought that the dollar was strong , ready to break to new highs and run to $1.20. I said that the dollar appeared to be weakening internally to me .
AUG 5– I viewed it this way . If the DOLLAR DROPS, could Metals POP? I expected the Dollar to drop.
Back on July 26 – The C.O.T., $BPGDM, EXTREME NEGATIVE SENTIMENT also pointed to lows in GOLD soon.
Though there is risk in all trading, and anything can happen due to geopolitical changes or circumstances, We were being dealt a favorable hand. A strong hand in the Precious metals sector was being dealt.
To help readers to see this as a possibility….
JULY 29 _ Most still calling for a plunge to $900 Gold ( yes it was possible) , but I pointed out that many were saying GDX had a bear flag. I thought it looked a lot like March lows AND I saw individual Miners starting to be accumulated. This added to bullishness. I used these charts below –
NG– running higher with Gold selling off? Bullish.
Gold selling off, but SSRI is not even close to the March lows
I’ll admit that I’m not a great E.W. technician, but I did think that these patterns fit well for what I was “Watching”.
FAST FORWARD to this past weekend. I showed various charts including this one. HEAVY VOLUME but price couldn’t sell off?? THAT seems like accumulation. At the very least this is a low risk buy at this trend line, because your stop is close below and the upside could be great.
So far Monday and Tuesday have not disappointed, and many Miners are moving higher with good %-Gains . Have you seen SA? Up over 70% from its lows. ( Disclaimer: I didnt grab this one early enough, but there are others set up in similar double bottom fashion).
I believe that this is not a 1 or 2 day pop, I think we are already seeing small bases and double bottom lows preparing to rally higher. I have been telling my readers that this set up is the type that usually runs for several weeks. Of course, they dont usually run straight up, there can be pullbacks in the stair step climb higher that offer buying opportunities… It may help if you have a ‘Gold Watch’ on your side.
Maybe you’ll consider signing up for a month and see if you like what we have to offer here? Todays report alone will have over 20charts. We also have a small chat section/ comment section under each premium report where some of our experienced traders share their ideas or questions too. If you’re not able to sign up at this time, I still want to thank you for reading along here at the free content section of the website.
P.S. I have been preparing readers since this spring that a nice summer rally would arrive this summer. The potential %-Gains could become the best short term trades you make this year. Best Wishes 🙂
Gold, Silver, and Energy stocks have been bottoming and some have begun adding nice %-Gains already. I had warned that if we didn't take a position, it might get very hard to do so. Why? We might see what is known as an Island Bottom. A Gap open higher that may not fill. I used this chart yesterday to point that possibility out.
Lets review some charts of Gold, Silver, and Energy stocks for potential entries...Read More
Mid day thoughts...Read More
I was very happy to see the steps that the Metals and OIL markets took as the day went on. We will discus those steps in detail further on in the report, but first lets take a look at one of the major players in todays movement.
USD - many were saying how strong the DOLLAR was looking, but I was writing that it looked weak internally, since mid July. This should bode well for Commodities.
Notice the next chart of the Dollar...Read More
For quite some time I have been pointing out things to take note of that are a little different than many others saw things. I think others are starting to see what we were pointing out here months ago. I was mentioning a bearish rising wedge pattern in the spring, and in June I looked at the SPX this way.
JULY 24, the SPX had not broken out from that toppy looking curve.
Would the BULL MARKET break higher soon?Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.