Yes, Gold has a bullish looking set up, and miners not only sold off, but they broke to new lows. We will discuss that, but first lets take a look at the rest of the markets..
NASDAQ - The futures are up over 100 to 200 points each morning, but the rally fades. What to do?
Here is the SPX ...Read More
As expected, we have seen quite the sell off in the general markets. Oil & Commodities have been selling off too. Gold , Silver , And Precious metals are holding up, but are they ready to run now, or will they sell off? I actually spent a part of this weekend digging in to older charts and making some new ones, so lets take a look..
While digging into older charts, I actually found this warning chart that I posted in April of 2015, when I said I thought we were seeing that rising wedge forming. Also by counting the months of the Bull market, we looked to be late in the bull. I am re-posting it because it had a logical target to me at that time.
SPY - We topped in May 1 month later. Now drop to Test the break out?
SPX - We broke the Aug lows Friday and recovered. This is a failure, but we can get a solid bounce soon. Lets discuss a couple of possible scenarios . One is a flash crash right now, the other is a believable rally that rolls over eventually.Read More
Yesterday I saw a rather bearish development in Miners, so I immediately began doing research to see if what I was seeing was a major concern. I found something very interesting that happened in the past, and I will share that finding with you here, but first let me review Gold here..
This was Gold in my last couple of reports, and I expected it to drop down and test the break out. As mentioned, Gold had a very bullish set up, and the C.O.T.remains bullish. Here is how it played out. I expected a back test..
We got the back test, but Miners broke down as gold reversed higher. And with Gold then down pre-market, would this pattern hold up?
This was Gold at the close Thursday. We would like to see this triangle hold up, and so far so good.
What about the Miners though? What did I see that was concerning, and what did I find that I thought was important to share with you?Read More
In my last public report, I pointed out that I expected Gold to back test the break out & 50sma area. I posted this chart.
We got a perfect back test as expected and reversal. This chart from Yesterday looks very Bullish, but Miners didnt react strongly.
Now Gold is dropping pre-market. What am I looking at today when it comes to Gold?Read More
I had this chart in my weekend report. After this weeks selling, it looks more and more like a reality, and not an illusion.
SPX CURRENTLY - I expected a bigger bounce this week, but the 2 day bounce was sold off yesterday. This is a break down and a back test.Read More
SPX - Yesterday I was pointing out the reversal candle and we were expecting a move higher, but would it be just a bounce?
SPX - We will get follow through, so traders can trade it, but at this point I do not expect a return to the Bull run. (See the weekend report for the big picture). Strong overhead resistance is pointed out, if the markets can make it to that area.Read More
We know that sooner or later the markets will bounce, but what should we expect? A recovery or just a bounce? Lets check out the charts....
SPX- There are points of resistance to be watched along the way. Look at the Aug - Sept 'bounce'. That first month was rather lack luster, but the surge in October was brisk. With a reversal on Monday, we may get out move higher immediately.Read More
Most people realize that you can't solve a puzzle by forcing together pieces that dont fit. As time goes by, however, various pieces do come together, and the big picture becomes clearer. That may be happening now, so lets look at some of the pieces of this big picture puzzle.
SPX WKLY- I had pointed out a bearish rising wedge forming in the SPX since last spring & last summer. After a break down this summer and back test, we had further selling as 2016 began. Is it done?.
$RUT - The TRAN and RUT look to be starting lower highs and lower lows. We could get a bounce soon, but you can see that with further selling this could easily drop to the 800 area.
Might a falling market help Miners, or do they all fall together?Read More
As time goes by, it certainly seems like the pieces of the puzzle are coming together to reveal the Big Picture that I have been discussing for months. 2016 could be a great year for some, painful for others if this continues. Lets review.
RUT - NOT VERY ENCOURAGING IF WE DONT GET MORE THAN A BOUNCE SOONRead More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.