The following are a few of the charts I’ve posted in recent Premium section of the website. I believe we may be seeing a major shift in the markets and the recipients of future money flow just may surprise many. Hint: They have been targeted on the short side for many months and in some cases, even years. Here are a few things pointed out in a recent reports.
SPX JULY 24 – I have been pointing out a topping process. Watch for a drop.
AUG 24– I did not recommend going short after the first drop, it is often better to wait for a bounce. Tops are a process . Look at the tops of the year 2000 & 2007 below. It took months to complete a top and even then, after each drop, a solid bounce can be seen (Blue arrows).
The weekly USD looks pretty strong. We saw a reversal off of the 38.2% Fib line (Amazing, huh?). I have said that I see weakness short term for weeks now . Was that drop all there was to it?
USD DAILY – I actually still see weakness within the rally, just like I saw in the MAY rally that rolled over. We could hot 97 , but I think that would be it for this rally. Commodities are also possibly indicating that the dollars rally is just a bounce.
CRB – Rising with the dollar this week. Bullish Engulfing at the lows. Strong divergence on the weekly chart. These lows should hold for several weeks (possibly being THE commodities low).
WTIC WKLY – BULLISH Engulfing Candle at the low. Strong buy last week, I.M.O. I see weeks of higher price from this low.
WTIC DAILY – I called Aug 27 the FAT PITCH in my recent report, a ‘buy’ on OIL & ENERGY STOCKS. For oil, the 50sma could cause a temporary pullback, a buying opportunity. That has happened this week. Soon we should move generally higher for weeks.
GOLD,SILVER, & MINERS
This is the Gold charts cycle count. On day 28 it is due for a daily cycle low anytime now. Even a drop to $1109 does not damage the chart. We should then rally higher.
Silver weekly – It is a bullish reversal of sorts. It could be a high volume capitulation type stop run, that would be great. We need further improvement this week. I am watching this carefully.
SILVER DAILY – Sept 2 , A Shake out may have taken place and so far we are moving higher.
GDX – We see a struggle at the 10sma, but I expect that we will break & close above it soo
GDX:GLD is heading in the right direction. Another buy soon if miners continue to out perform.
SO I am cautious about what is happening in the broad markets. We are seeing a bounce higher, but buyers may get washed out soon. These are volatile markets and we may be setting up a longer term short.
I like what I see on the weekly charts with GOLD, SILVER, MINERS, The CRB ,OIL, & ENERGY STOCKS. They have recently turned bullish. I mentioned in past reports the bullish set ups developing in ACI, BTU, AKS, BOOM, X, FCX, VALE, MDR . With OIL AND ENERGY I also pointed out many that are also moving nicely higher. Some energy stocks are up 100% already.
Here at Chartfreak I am watching the various set ups and offering opportunities to buy the pullbacks at low risk entries. I will include a few of the charts that I used in recent reports. For a low monthly or quarterly price, you can get reports like the above report 4 or 5 times a week. Thanks for being here.
FCX – Buy the reversal. Strong volume and above the 10sma.
FCX – Low risk entry, stop below the support.
AKS – Low risk buy of a double bottom.
AKS today – This is still a good set up, support held.
EOX – Sept 1 , this stock is spit adjusted, but it popped almost 100% in 2 days.
EOX Currently – possible bull flag forming or just a move higher.
WG– Some Energy stocks trading under $1 have formed long bases. I liked this set up.
WG– Trading at only $0.90 , it was showing signs of life, already up 35%
WG– Then it popped above the 50sma, even better.
WG – Still moving higher. So far 20% higher from that $0.90 mark .
Many times we hear about buying the pullback, but when the pullback comes, it may be too intimidating to pull the trigger. Did you do any buying yesterday? Lets review the market action and also discuss "Pulling The Trigger"..
SPX - The Spx has turned back down at resistance and has been rejected at the 10sma too. Wednesday the markets reversed back up to the 10 sma. This time it may be able to push higher.Read More
It felt like just about everything in the market was pulling back today. Not all pullbacks will qualify as a 'Buy the dip" candidate, but some may be setting up as a nice opportunity. Lets take a look....
SPX - This turned down at multiple resistance areas.Read More
This report will be a report on the statistics of what was reported on in the weekend report...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.