The Uphill ClimbWhen a climber begins his or her ascent, they are full of energy and the start of the climb is always easier than when they near the peak. As the climb continues, you may see him or her periodically rest, shake out the tightness, even drop back and pursue a different path to the top. I often see that same thing happen in the climb of various stock market sectors, and Precious Metals and the Oil sector is experiencing that now. (Long term they remain bullish in my opinion), WTIC - This was June 14 and we were on day 50 of a Cycle, so it was already late in crude oil's daily cycle and I was expecting a low soon. Read More
When a climber begins his or her ascent, they are full of energy and the start of the climb may be easier than when they near the peak. As the climb continues, you may see him or her periodically rest, shake out the tightness, even drop back and pursue a different path to the top. I often see that same thing happen in the climb of various stock market sectors, and Precious Metals and the Oil sector is experiencing that now. They remains bullish long term in my opinion. We will discuss that briefly, but first....
SPX - SPX put in a reversal on Thursday just as it started to lose the 50sma. We'll see if there is any follow through to its recovery today.Read More
That's what I heard from the Fed.
SPX - This needs to move higher soon. It is starting to show internal signs of weakness, even though it doesn't look like much of a pullback. The VIX looks like a bull flag may be forming.Read More
This was my thinking from yesterdays report...
This is how Tuesday ended. We lost and regained the 50sma and today is Fed Wednesday. Will the 50sma hold or will this drop to the 200sma? Lets look at 2 more things.Read More
Monday we saw a little more selling in the general markets as we approach the Fed meeting Wednesday. I have been bullish for a possible break out to new highs, but recent action is less bullish and it may be that we wont know for sure until after Fed Wednesday. Tuesday may also be a little bit boring ahead of the Fed..
The SPX - This looks a bit better than the DOW, NASDAQ, And BKX at a glance, but notice that it looks to be dipping into a daily cycle low. MAYBE the Fed Wed decision will hold it at the 50sma and set a new trend line, but right now, this warrants caution.
The NASDAQ is a tad weakerRead More
After we review the general markets, Oil, the CRB, etc, this weekend report will focus mainly on Gold, Silver, and Miners. To the charts...
SPX - This is a Fed Week, so I am watching the markets very closely at this critical area. This is rather early in the daily cycle, and if this is "the Peak', it will likely be left translated. We saw a slight break to new highs and then it gave them up. On day 15, I'll we watching this closely going into the Fed mtg.
You may have heard that you should not buy precious metals miners until after a ‘blood bath phase’. I mentioned within my (premium May 18) report that I have received numerous emails telling me that warnings were out that the next Intermediate Term Cycle Low (ICL – A cycle low that occur every 5-6 months) will not come until we first see a huge sell off within precious metals. Many fear that the blood-bath is still directly ahead, and some think it will occur around the Brexit vote (June 23rd).
Today, I would like to share with you just a brief excerpt on what I’m looking at here within the precious metals sector. And within my coming weekend member report, I will be going into much more detail on what one should expect in the coming months.
Below is a chart that shows what happened coming out of the 2008 lows, when many were also looking for a an ICL and “blood bath” sell-off. As you can see, advances out of bear market lows do not follow the typical script. Simply put, there was no blood-bath to be found around six months after the Oct 2008 lows…it occurred almost one year later.
Actually, for the past two weeks, I have been saying that we could be at or past the next important low in the precious metals sector. Last weekend’s report discussed this idea further, and this weekend, I will include more research on that theme.
I also mentioned that a gold break above the overhead down trend line would give further evidence that we saw an ICL, without a blood-bath phase. This was gold on June 9th.
USD – The USD was in decline, but due for a Daily Cycle low (DCL) this week. On Thursday, the USD took back three days of losses, but Gold and Silver moved higher despite this strength. We have seen a change of character here, where the dollar can rise and gold manage to resist the expect drop in response. See also Feb 2016 on this chart.
It will never be a straight run higher with precious metals, it takes discipline and patience. However, gold bull markets are known to surprise and have the ability to leave so many people behind. With this weekend’s report, I will outline what I believe is occurring today and will cover what members could expect going forward.
Chart Freak Premium
Chart Freak members receive up to 5 premium reports per week covering a wide array of markets, as this public post illustrates. Come and join the ChartFreak community as we trade the new Gold Bull Market and various trending sectors.
We have 1 trading day left in the week and then we can relax. The weekend report will further our discussion on Energy and Precious metals, so today I am going to just show you 3 charts that will be in the weekend report..
You may have heard that you should not buy miners until after a 'blood bath phase'. As mentioned in my May 18 report, I have received emails telling me that warnings are out that the next ICL ( meaningful cycle lows that occur roughly every 5-6 months) will NOT come until we first see a huge sell off. Many think that will happen around Brexit ( June 23rd)..
I used this chart to show what happened coming out of the 2008 lows, when we looked for our 2nd ICL. I do NOT see a deep bloodbath phase 6 months after Oct 2008 lows. I see higher lows for 1 year, so that is noteworthy.
Actually, for 2 weeks I have been saying that we could be at the next important low in the precious metals sector. Last weekends report discussed this idea further and this weekend will include more research in that area .Read More
The trading has been good for the past few weeks and as time goes by, we are seeing many things coming together as expected. By the time we get to the weekend report, pieces should fall into place and give us a clearer big picture too. Lets review some of the recent action and how it has been playing out..
DJUSST WKLY - I posted charts of STEEL in May and June and expected another run higher. Steel stocks should benefit.
STEEL - This is the daily. Lets look at steel 1 week later. Steels daily 1 week later.
STEEL JUNE 8th - One week later and Steel is breaking out. Steel stocks like STLD, AKS, X, etc have started running again too.
Notice how Steel broke above the 50sma, stalled and then took off higher? Then take a look at this...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.