Lets review the movement in various areas of the market that we at Chartfreak have been charting. We will look for Progress in what we have expected..
SPX Nov 20- We expected a back test and drop months ago when it seemed like EVERYONE was uber bullish
DECEMBER - H&S
Obviously we all know that January has been brutal for "longs', great for those "shorting". Is it over? Well I do expect a good size bounce soon ( multi week even) , but when everyone becomes bullish again, I'll be watching the downside ...
What about THE DOLLAR...Read More
I wasn't planning on a Friday report, but Thursdays action in several areas was important enough that I wanted to share a few charts. Also a reader ( we shall call him D.F.), pointed out an area of interest that I will touch on here too..
Lets start with the USD. I saw weakness and have been saying that I expect it to drop. I posted these charts last week.
We have been in Gold & Miners for a while now, but a weak dollar could help Precious Metals and Commodities further. I will cover this more in the weekend report , but for now, what did the Dollar do Thursday?Read More
The markets are always dancing around on a Fed Wednesday, and often the volatility spills over into Thursday. Lets take a look at the charts and see what we can see.
SPX - The markets sold off after the Fed Decision. I called for lows recently and I still expect higher prices to develop from a bounce. You can see that this is how the markets moved coming out of the lows in August too. I do not expect the recent lows to be broken, but a little more downside is not out of the question. Please notice how difficult it would have been to trade the Lows in August/ September.
That being said, the RUT / IWM looks like a bear flag, so lets look at a few other areas.
Lets look at the NASDAQ...Read More
So lets just pretend that today is just a Wednesday like any other Wednesday. Things are playing out exactly as expected. To the charts!.
SPX Monday - I called the reversal last week a trade-able low, and the Quick sell off Monday just a back test of the trend line.
SPX TUESDAY - It's only day 4 , so I expect this run higher to continue.Read More
Monday saw a little drag on various sectors of the market, but I still expect a bounce before another wave of strong selling resumes. WEDNESDAY is a FED day, so anything can happen, but Cycle timing is right for bounce.
The old saying is that a picture is worth 1000 words, and sometimes I see a chart that's worth a thousand words too. The Banking index, for example , says a lot..
This is the Banking Index
The above chart is quite oversold, but it is also quite unhealthy looking...Read More
Here at Chartfreak , we've been looking at the short term moves for traders that are likely to occur as well as The Big Picture that may be changing. I expected changes, and that is what we have seen developing already in 2016. The weekend report had over 30 charts, so I thought that I would share a couple here with the public readers..
SPX QUARTERLY - They say that a picture is worth 1000 words. This speaks volumes if things dont change in a big way.
Lets look at a few other areas...Read More
The weekend report will discuss the changes that we have expected for months, and how we now see those changes taking place. Also, as mentioned in the last report, the recent sell off is now changing into a Long position, but for how long? To the charts! 🙂.
SPX - On Thursday, Jan 21st I mentioned that a swing low was in place ( Bullish for going long). It is safer to wait for follow through with a confirmation break above the 9 sma.
SPX - We had that confirmation on Friday. For traders, going long SSO, TQQQ,IWM, and various stocks was in place.
But please, lets not forget the Big picture too...Read More
Just a Quick market review and then I want to discuss some fast trades for those that like to trade, but aren't ready to buy & hold quite yet..
SPX - I discussed the reversal and likelihood of that low to be in place for a bounce / rally. Thursday did put a swing low in place and the timing is right for a low. We do not have a break above the 10sma as confirmation yet , so the safer trade lies ahead, but some may have wanted to buy the swing based on timing, and place a stop below the Wed lows.
SSO, TQQQ, etc can be traded coming out of the lows, with a stop just below recent lows.Read More
The Dow Jones Industrial Average was down over 550 points yesterday and then rallied back into the end of the day, putting a form of reversal candle in place. Thursday morning the futures are RED, but we are at an extreme point that calls for a bounce/ rally. Yes it could last for days and weeks, but is the selling over? Lets review the markets and some stocks..
The SPX put in a large reversal candle too, after breaking below the August lows. 1730 is a normal downside target, but I think we rally first. It should be easy to get a swing low. A move above yesterdays highs begins the process.
What do I expect from this move higher after it starts?Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.