Your past steps have moved you to where you are today, your next steps are just as important. Allow me to walk you through a look at what Chartfreak readers were hearing before & after the Brexit vote. Those steps brought us to where we are now. I’ll also show what we currently see when it comes to Precious Metals.
GOLD AND HOW I SEE IT NOW
I kept reading everywhere in Late April / Early May that Gold had to plunge down and tag the 200sma before it could move higher. Why? Many thought that Gold was overextended. I agreed that it could, but I also pointed out that Cycle Timing caused me to be looking for a very important low imminently. I drew a drop to $1200 area, but mentioned that $1170 was possible too.
As we dropped to the $1200 area , Fib #’s and ‘ Cycle Timing’ came into play. I was looking for a low.
I then called a possible low at the $1205 area with capitulation type selling scaring everyone away and causing a lot of ‘fear’ talk. I mentioned that I couldn’t tell for sure, but I think that the lows were in or at least a buy-able bounce with that reversal. I began buying Miners 4 weeks ago, at the end of May.
This was day 3 of the lows, and an extremely low jobs report was released. Gold blasted off higher. A close above the blue line would confirm my idea of deep meaningful lows ( An ICL).
I was asked in an email, “What about all those saying that the 200sma needed to be tagged?” I agreed that that ‘tag’ could come, but did it have to be in May? I said No, and drew this idea.nThe Tag could come later and when the 200sma is actually higher.
Gold was now a bullish set up and was running out from an ICL. We actually had a consolidation from FEB to June, for those thinking that Gold was overextended. It isn’t, it had gone sideways for months.
Silver stocks have doubled and tripled, is the move in Silver & silver stocks done? This is a great looking base if you ask me, and only the beginning in the long run.
And GDX & GDXJ have had great runs higher too, but that may be just the beginning.
Timing a trade is important though. Now I want to walk you through a few trades, and show you a current trade that I think will play out well.
I recommended VGZ and MUX before they exploded higher. I didn’t offer an exact entry or exit, just that I had bought them a bit earlier and they were looking at a possible explosive set up.
MUX – I had mentioned to my readers that I had been buying Miners and bought MUX in May at the 50sma near $2.25. June 12 it was now breaking out from a constructive consolidation with great volume. Even at this point it was a buy-able break out.
MUX popped and ran very strongly. It remains near $3.75 consolidating recent gains.
JUNE 13th – VGZ was at $0.97 . I bought this consolidation and mentioned that I thought Golds ICL was in, Miners should be bought. Dont go ‘all in’, but it was a great trade set up as shown. It had a super base.
VGZ at $2.02. Gains of over 100% in 2 weeks.
That leads me to today. When those positions get extended, I like to sell at least 1/2 and look for other similar set ups. I pointed out this stock Monday and even with fundamentals that are not ideal- the set up is perfect again.
June 27 XRA– This has had a nice run higher and has consolidated. I bought it near the 50sma and posted this chart as a buy above support. Another 97 cent stock 🙂
XRA – It wasn’t just the recent consolidation and set up that I liked, I also pointed out that another super base adds relevance. Does this base look a bit like the chart that follows it to you?
VGZ as it broke out and ran to $2+
Tuesday June 28 – So again, I had already posted XRA, but I posted it again in todays report. This is an explosive looking set up, even if one just took it for a quick trade on a possible break out.
XRA June 29 as I write this report, XRA is up another 13% today. Actually , it just popped up 20% as I was writing.
THM – I pointed out another one just like it Monday at 75 cents, what a nice set up. Watch these run.
I am constantly searching for what I know to be explosive set ups in the bullish market sectors, Right now I am bullish on Precious metals and the set ups look very nice.
So did you buy VGZ, MUX, ASM before they broke out? Are you in XRA today? Not every trade works out with 20% gains day after day, but these recent gains are seriously helpful to the portfolio. For example, I also recommended SAND & BTG over the past 2 weeks and with small gains, SAND backed up yesterday on a public offering. Not a big deal, down 7% and I am actually still bullish on SAND, but I just wanted to point out that not every great set up works right away. A small position in the ones that do make up for any that do not however. Honestly, other miners recommended are doing well too, and still others are currently ‘setting up’ for possible future explosive moves.
I will keep premium members posted when I see these bullish set ups. I do see a few more currently acting correctly. Why not get an extra set of eyes by trying chartfreak for a month? One trade may pay for that month. Thanks for reading along, and best wishes!
Friday alone wasn't enough to give us the information we needed. Monday helped and now we have Tuesdays trading to add the the equation. lets take a look....
SPX- The positive side....the weekly chart ( yes, it is only Tuesday) would shape up nicely if we held here or continued higher. That's a big 'if'.
The bearish side...Read More
Friday we saw the initial reaction to the Brexit vote, and Monday we saw some follow through. Lets look at the charts...
From the weekend report...Read More
Last week the General markets went through a period of indecision. Each morning the futures were green, then the markets sold off into the close. We had the Fed giving testimony to congress and the Brexit Vote scheduled for the end of the week.
After the Brexit vote, the future went Ka-Boom, with Gold up almost $100 at one point, and the general markets ( in the US/ and globally) panicked..
SPX - The Dow closed down over 600 points, the NASDAQ was down over 200 points, and the Spx was down about 76 points. That is a rather ugly candle.
The ICL (Lows) were not broken, but...Read More
Some are locked into positions for better or for worse, others may be locked out of positions ( MINERS) that they hoped to own on the next run higher. We have been buying and adding. Anyone holding leveraged positions may be in for quite a ride. Lets have a quick look....
At Chartfreak, I announced that I thought the next important low (ICL) was in for Gold 3 weeks ago and began to buy miners. Confirmation of that ICL came a little while later with a trend line break and a few other factors. I drew these expectation in my Gold chart for June 14th, a possible run to $1400+.
While the BREXIT vote was going on Thursday, I decided to take a snap shot of Gold before I left for dinner. This is where we were at. I also thought that we could tag or slightly break the 50sma ( shake out) and then move higher. We hit the $1255ish area, just below the 50sma.
Later Thursday night, this is what we had. Unbelievable! Gold was up $85, and the Dow Futures were down $677. The NIKKEI was down $1430 ! The US Dollar was up almost 3!
We are THAT much closer to the Brexit vote and it is being discussed on any and every financial media outlet available. Here is the 'kicker', did you know that it is forbidden that the vote be reported by the British media after the voting begins? Yes, that's right, they can report on it right up until the voting begins, and then there will be NO UPDATES all Thursday, no exit polls, no nothing. Until all the votes are counted, the British media is forbidden to report on it. So Thursday is the last day that the markets will function as pre-brexit markets. Are you ready for more of this....
SPX - Not very dramatic so far, but it is holding above the 50sma and remains close to former highs.
What else have we seen this week?Read More
So far this week is pretty much playing out as expected with the combination of the Fed testimony and the upcoming Brexit Vote, but a comment by Tess in the chat area had me wanting to take a closer look at Precious Metals. Things are still exactly as expected, but a slight variation in cycle count may be in order. Lets have a review of our markets first....
SPX- As expected so farRead More
Monday we awoke to a Gold and Silver slam down, and the futures for just about everything else was pointing to a higher open. As the day went on, Gold and silver went higher and the general markets sold off into the close. Tuesday, the futures show pretty much the same. Will today bring what we saw yesterday? Janet Yellen is testifying before congress on Tuesday and Wednesday, and Thursday is the Brexit vote, so it seems that many do not want to commit ahead of time, we may just get more of the same..
DJIA- The Dow regained the 50sma intraday, but then sold off into the close.Read More
Please read the weekend report, this is part 2. I wanted to post a few trade ideas.... Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.