I wrote a report about Bull Flags for the premium members last night. Why? Questions have been raised.
On Feb 17th, after the recent run up in Gold, I mentioned that Gold could Pause and form a Bull Flag. These are often just a pause along the way (although they can fail).
Feb 17 - I discussed a possible Bull Flag forming after a strong run higher.
Feb 24 - We have the Flag and as mentioned, it is often just a pause before continuing to run higher.
Well on Friday Feb 24 Gold broke out and dropped. Many said Gold failed at the Bull Flag. Friday Feb 26 ( Today) Gold dropped down to $1212. Does that hurt the Bull Flag and prove it is a failure, like some are saying?
No- Let me show you 2 ideas that are not a stretch or grasping for straws. These are legitimate patterns playing out .Read More
On Feb 17th, after the recent run up in Gold, I mentioned that it could Pause and form a Bull Flag. These are often just a pause along the way (although they can fail). So lets discuss the last few days and discuss Golds Bull Flag and other important implications that I am seeing..
Feb 17 - I discussed a possible Bull Flag forming after a strong run higher.
Feb 24, We have the Flag and it is often just a pause before continuing to run higher.
Then I started seeing similar bullish formations in various Miners, like TGD. This is an ascending wedge or ascending triangle, and usually plays out in a bullish break higher too. Hmmm.
Lets discuss chart patterns and look at some more Miners...Read More
There were reversals all over the place yesterday. From the Market sell off and Oil reversing higher, to Gold and The Miners breaking out only to turn lower. What can we expect going forward?.
SPX - Volatility has produced many reversal here at the lows, but I think they were just clearing everyone out before a run higher.
In an earlier report, I pointed out this possibility, and we see it playing out...Read More
I've been expecting a multi week rally in the markets since Feb 11, and so far it is pretty lack luster. I noticed weakness in the SPX on Monday and mentioned that I thought this would cause the 'rally' to stall.
I posted this chart, read the writing.
The SPX was rejected at the 50 sma.Read More
Are you basking in the Traders paradise? At Chartfreak, trading has been good in Precious metals and Commodities. Lets take a look at a few of our expectations going forward and review some trade set ups that are still working out favorably.
SPX WKLY – After warning that there were signs of another sell off coming in November,I have recently been expecting a rally to draw the bulls back in. I expect that we could see a repeat of the run up last September, as highlighted.
Back on November 13 , I had a $26.09 Target for Oil on a weekly chart. I also pointed out a $24 target later , if the selling reached extremes.
Last week the XLE didn’t make new lows, but Oil did, dropping to $26.05. That along with cycle timing caused me to look for Oil to possibly see a temporary bottom here.
I used these charts in my February reports.
Oil gapped up recently , so I drew my expectation of a gap fill and a tag of trend line. Then the move higher.
We got a perfect tag of the trend line. I still believe that Oil may be finding a bottom unless this trend line breaks?
Notice that Some Oil Stocks bottomed last summer, well before Oil.
GOLD SILVER & MINERS
GOLD– We caught the strong run up in Gold and Miners right from the shake out lows in GDX. On Feb 17 I thought that a FLAG could form to consolidate recent gains, while individual Miners may still rally or play catch up, so I presented this idea and a few alternative ideas as well.
You can see that the Bull flag is almost complete.
SILVER – Silver never broke out, so it may do that this week or it may just continue to consolidate.
I definitely believe that we may be seeing the next phase of the Bull Market in Precious metals starting, as we surge out of the lows. Nothing goes straight up though, so lets also discuss what an eventual pull back could look like, as it may present another buying opportunity.
This is one that would shake many people up. I don’t think that it is the most likely path, but it needs to be viewed to prepare us for any possibility.
These 2 charts were in my last public report. I favor these views.
What about this Traders Paradise? Past public reports have pointed out some of our trades in Miners and commodities. Lets review a couple more here.
SWC – This stock was pushing on the 50sma and was a good set up last week.
SWC – SWN has broken out after reporting earnings. I expect higher prices.
MUX – We recommended a 2nd buy on Jan 26 at $1.17
MUX – today it is at $1.75. If Miners pull back in a significant way, I can see a test of the 50sma as possible.
ABX – $ 7.65 inverse H&S with good volume pops.
ABX currently at $13.42. This may just form a handle, before another strong mive higher.
Here is some good news too. Some of the commodity stocks presented in past reports as ‘trade set ups’ now appear to be breaking from their bases and could have great upside potential for the long term.
CENX – Feb 3, nice long base with a shake out, ran and pulled back to $4 at the 8 ema.
CENX Has moved from $2.63 to above $7. A pullback may be another buying opportunity. Look back at how ABX and NEM ran from their long bases.
FCX was mentioned as bottoming near $4, and then a 2nd buy was at $6 as it broke above the 50sma. FCX is near $8 today. This also may be bought on the dips if it remains healthy.
Feb 3 – VALE at $2.32 , this was a low risk entry, since your stop would be placed below the lows. Price is now trading above that blue triangle.
X Daily– Notice that US STEEL is forming a multi month base with divergence. This has a lot of upside potential if it recovers from here.
Recent reports featured AA, AKS, STLD, TCK, VALE, FCX , etc., and most of them now look like bases that may become longer term bottoms.
I’ve been discussing the possibility of the Equity Markets topping and the Bull returning in Precious Metals and Commodities for a while now. Many public reports have been posted at Chartfreak.com to highlight these events. I liken it to a large freighter ship turning around in the ocean. They can’t turn on a dime, but gradually they will reverse course and head in the other direction. Is that what we are seeing here in the markets today? Many Miners and commodity stocks look to have built their bases, and they could even become buy & hold investments longer term if conditions remain this way. Why not join us as we continue to monitor the situation? Chartfreak.com
Well, I had a weekend report with 32 charts and not much has changed in one trading day, so lets do a little review and then look at some trade set ups..
Last week we saw a healthy set up for a move higher
This week...Read More
We have been on a rocket ship ride for a month now in Gold & Miners. Whenever someone posts a "Rocket" as a headline picture in their report, we usually immediately get a pullback. I'm ready, so I thought that I would give it a try 🙂.
This is the rocket (this was my chart from Feb 16).
We will discuss Precious Metals in a moment, but first lets do a complete review starting with the SPX...Read More
Precious metals and especially individual miners keep climbing higher. Wave after wave, the dust buyers and shorts are getting hammered. This wasn't entirely unexpected, that is why I mentioned taking some profits and letting partial positions ride. This runaway , melting upward type of move can be rewarding, but cycle wise, it is will pause or pull back soon. We'll discuss that. The markets were moving up off of their lows too, but they stalled on Thursday. Oil turned back down too. To the charts...'
It's Friday, so there isnt much to say with only 1 trading day left, but lets take a look and see what we can learn.
This was 1 of my 2 Gold charts from Thursday mornings report. Gold actually hit $1240 as the day went on, so it looks like that flag pattern could form. While it does look like that Flag pattern could form, I actually think we may see something else too.
Let me show you what I think is happening now...Read More
I'm going to share a portion of the premium report from Tuesday. We had been invested in Miners from the shake out lows, but most of what was bought has had a spectacular run higher. Now that there could be a consolidation phase in precious metals, does anything else look interesting? Have you seen VALE, FCX, CENX, etc? Commodities are making some nice steady gains. I'm also looking at The Energy Sector among other things. From Tuesdays report...
I think OIL is putting in lows (temporary or permanent remains to be seen). Lets discuss a few ideas as to why I think we are at lows in Oil..
On November 13th , I said that my OIL WKLY target was $26.09
Did we hit $26.09?Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.