Crazy action in the markets today. Some of it was expected, but some of it doesn't seem to fit. Lets take a look.
IBB - Really taking it on the chin lately. This is a weekly chart and todays volume was massive.Read More
It would be good to look back at the past weeks activities and see how things are stacking up.
TRAN WKLY - This surely hasn't looked bullish as the trend changed. The Tran was rejected at the 10 ma this week again.Read More
A quick look at the markets and a brief discussion on shopping
On Sept 22 - I said that I was looking for a possible 'Test' of the break down and then a drop.
SPX - Reversal candle. Maybe that 'Test' comes now.Read More
Yes, Gold is jumping, but we’ve seen that before, right? The question is , ” Will it make it to it’s intended target, or land flat and flounder around like a (gold) Fish out of water?” Here at Chartfreak, we have been waiting for this next leg higher. Lets review some of the charts from recent premium reports…
GOLD SEPT 22 – Looks great on day 7. The first run up went from $1072 to $1169. It could pull back even further and still look very Bullish, but it doesn’t have to. We are in our second daily cycle and I expect that Gold could run to at least $1200. We will monitor it along the way.
Silver – pretty big 1 day drop, but it has not moved down with Gold on the last 2 days, so it is not a broken chart by any means. Notice similar 1 day drops in July and August that had no follow through. I wanted to see those moving averages hold, and I am also watching the trend lines drawn.
GDX – Yes, GDX fell more than I expected. I was looking for the 10 SMA to possibly hold as support. The chart is not broken and I’ll show you why…
GDX (2)– Looking back at last Nov-Dec when we were dropping into a 2nd daily cycle (RED ARROW) . We took off and curled back down to the lows again ( 2nd red arrow) before a nice blast off higher into January. We could be seeing that here, thats why I say the chart is not broken.
Some were not happy with the action in GDX (understandably) , so As a reminder , I posted this in last nights premium report.
Here is a close up of that period last Dec 2014. GDXJ popped and dropped to shake out weak hands. This looked exactly like what we were seeing now. Compare these 2 charts below together. The 1st is last Dec and the 2nd is today. Twins.
What happened next? This is the same chart of last December as the anticipated run started. The red arrow points to where the first chart above ended.
Conclusion: We were in the 2nd daily cycle and a rally should begin soon unless something is very wrong. I also looked at the 2 charts below and declared them bullish, to further the case for a bullish move in the near future. They are larger components of GDX. Bullish descending wedges.
Today we have this (Click to isolate)
GDX 2 hrs into trading
I have been calling for another leg up, but many were growing weary (understandable with that GDX drop) . The above analysis was designed to help my readers to see the possibility and likelihood of the coming move higher. We saw dips like that before, right before a rally. It’s time to go shopping friends. Find your favorite Miners and gather a basket, start small if you have your doubts. Were you confidently expecting a move higher in Gold? Do you still have doubts? Though we saw weakness in Miners, we were still expecting a move higher in Gold , and we were watching for the Miners to get on board. Today we are seeing positive follow through.
I will be covering some set ups in future premium reports, and also navigating this move forward, since I believe we have started the next leg higher. Why not try a 1 month sign up? Thanks for being here!
Whenever we get mixed signals in the markets, it may take time to allow things to clear up. We are seeing that with the divergence between Metals and Miners right now, but until time resolves the differences, we can also look for clues. We'll do that here, but first lets review a few other sectors.
NASDAQ - We got the back test that we expected and then the drop back down. I expect the Aug lows to be tested or broken, but you can see that volatility has kept things from being a smooth move. We may bounce around inside this down channel too.Read More
We are still keeping an eye out for various signs in these markets. Lets take a look...
TRAN - I posted this wdge as a warning in Monday nights report
TRAN - There was some follow through.
The selling was not on very heavy volume, so I am starting to think this move is going to drive longs and shorts crazy, here is why -Read More
Our positions in the Miners are pulling back, but it is a slow pull back so far. This pullback was expected. We'll discuss what to expect later in the report, but lets start with the pull back that came in the equity markets first.
SPX - It started with a shooting star and the stochastics indicate that we could see more downside. In fact, I have mentioned that I expect a test of the 'high volume candle lows' sooner or later.
The TRANNIES looked pretty strong re-gaining that 50sma, but they've done that before and a rising wedge is bearish. Notice the shooting star candles at past tops?
OIL is playing out as expected too...Read More
Lately things are playing out as expected, but it's always good to check this puppy out and see what is happening along the way.
I didn't have a Friday report post Fed, because I had 2 reports on Thursday. Lets review charts and see how things played out.
My NASDAQ chart from Sept 16 - Many were thinking that the markets were ready to rally to new highs after the Fed decision. I saw a rising wedge and a lot of resistance.
NASDAQ Sept 17 ( Fed day) Rejection at resistance. This was saying to short the markets.
NASDAQ - Friday Sept 18 , The day after the Fed Decision. This is still within that wedge, but that was a high volume drop and there is a lot more room to drop stochastic-wise.
This was the SPX on Thursday Sept 17. Price was rejectedRead More
Earlier this week I certainly thought that the markets were waiting for the Fed Decision on Thursday before making any big moves. Yesterday, Oil, Energy, and Precious Metals jumped the gun and were off and running!
WTIC – The set up was a Bull Flag pinched between support & resistance.
Oil is not waiting for the Fed Mtg. Many energy stocks were up over 10% and some were 15-25% today alone.
I mentioned in a premium weekly report when the markets first crashed that in the past, bear markets dropped and rallied and dropped and rallied. A back test would be likely, as shown. Honestly – we are not quite at that level yet.
I want to point out a weekly chart of the 2000 Top. There were drops and rallies drops and rallies. We have dropped and rallied in the past 2 months too.
Could we be ready for a Fed induced drop? On a Monthly chart the ‘back test’ is not in place yet, but we can drop here & rally again later.
NASDAQ – I just wanted to point out this rally. It looks like a bearish rising wedge at this point, with overhead resistance in various forms.
GOLD and MINERS
GOLD – The chart in yesterdays report pointed out the # needed to have a swing low in place. Above $1111.90 puts a swing in.
We certainly got that today. A swing low is in place on day 34. That was a right translated first daily cycle, so we can expect higher highs! We broke from a descending wedge and I consider this a buy. My initial target is near $1200 .
I have pointed out that a break above the 10sma ( and a close there) is a safer area to take a position in GDX. With GDXJ I used the 13sma.
I had expected Miners to wait until after the Fed decision too, but timing was late in the daily cycle and everything just popped all at once. I posted at 10a.m. that volume was likely going to be above 70 million ( by the close) as we broke from the wedge.
GDX – This was my 10 a.m. (yesterday in premium section) chart pointing out the volume to look for if the move was real.
While you wait you can look at DNN (uranium) . That’s a good looking stock set up. See also GTE and UPL – those looks like a buy right now ( Energy). XCO was up 30% (AGAIN!). To see the potential in some of these juniors, check out a 3 month chart of AXU, EGI, & GSS .
Good luck today
NOTE: It’s just $37 for over 20 reports and some 100 setup’s each and every month! If you’re serious about learning and trading, then come try it out. See: https://www.chartfreak.com/my-secrets/
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.