Well, you know the story. I don't usually plan on doing a Friday report. Thursdays report can usually cover what could happen on both Thursday and Friday. We are specifically focused on Gold & Miners , so we should discuss that area a bit before the weekend. Let's start with the $USD..
USD Oct 26 - Would the dollar drop into its Daily Cycle Low, or would the 10sma act as suppport? It is overdue to dip down.
USD Oct 27 - It DID use the 10sma as support so far. This Daily cycle rise is longer than normal.Read More
At this point in time, we should discuss lines in the sand for protective purposes. First, a quick market review.
SPX - No Change at this point. I see a failed daily cycle and weakness so far.
Lets take a look at the USD ...Read More
This report is all about How the internet works, and Gold, Silver and Miners..
This is how the internet works...
GDX - This was from my weekend report, and I showed how the 10sma could be tagged by GDX and the drop would back test the trend line. Totally normal, so we were ready..
GDX MONDAY - When it actually happened, this was exactly what we knew should happen. Well, the internet lit up with Bearish chatter. I was hearing that Gold was about to get crushed, Miners were 'crashing' , and the USD was rallying! T-H-A-T is how the internet works now, fear breeds fear. Is this soooooo bad?
Well lets discuss Tuesday and see ...Read More
So far I think that the action in the markets today basically matched my weekend report, but they were received with mixed fanfare. Lets take a look and review expectations.
I was looking at SPX like this, trapped under the 50sma and 10sma.
Today the Markets gapped open higher and the NASDAQ was up near the 2016 highs. Lets take a look.Read More
CAN GOLD CONTINUE TO RISE, SINCE THE USD IS MOVING HIGHER TOO?.
That question and other ones similar to it keep coming up lately and understandably so. Gold usually drops when the USD rises, but lately we do see both rising at the same time. I called a low in Gold recently and have been trading in the Precious Metals sector, but some are having a hard time believing it when they see the USD rising too. Allow me to share my thoughts on this. The following 4 charts are from the weekend report, where I tried to help my readers see the answer that question.
GOLD AND THE USD
CHART #1 -The USD has slowly been approaching the Highs of 2015. The chart does look quite bullish, but it does also show prior lows being taken out and lower highs so far.Read More
Lets get right to the weekend review.
SPX 1 week ago - It was struggling to move higher. Not a 'long' or 'short' play going forward, just sideways chop again.
SPX WKLY - No change, still looks weak.Read More
There was a time when I only released reports Tuesday , Wednesday, Thursday and the huge weekend report would cover Monday. I felt that the Thursday report would cover both Thursday and Friday and that the weekend report caught us up for the Monday trading. With the Bull markets of Precious Metals, Oil, and Commodities coming alive this year, I have released at least a small Friday report almost every Friday in 2016. Why stop now?.
So this is just another short ( short? 13 charts ) report to point out that Thursdays dip or slam down in Gold , Silver, and Miners actually may hint at some underlying strength, and that may be enough to encourage anyone that is a little too light to buy these dips. Lets take a look...Read More
Things have been falling into place step by step this week. In this report, I just want to point out a few things that I am watching when it comes to our positions in Miners after a brief review of the Dollar and Oil..
USD - This looks bullish really, but it is very stretched according to cycle timing. It should roll over into a dcl soon. The Precious Metals are ignoring the USD when it rises now, possibly a sign that the Dollar is ready to dip down.Read More
I wanted to title this report "We got it!", that was by request actually, but you will see as we go through the charts that I cannot say that quite yet. Dont get me wrong, I believe that you will like the ingredients of this report, so let's get right to it....
SPX - The SPX failed when it dropped below the Sept 12th lows, and has struggled under the 50sma and even the 10sma. It needs to prove itself, but it is struggling. The NASDAQ stocks GOOG, NFLX, AAPL, and others do look bullish, so I am just watching how this plays out over time. I am much more focused on the Gains that can be made in Miners.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.