Welcome to the weekend report after a semi puzzling week. We saw higher Gold & Silver prices, and lack luster GDX GDXJ performance. Let's get right into the weekend report....
SPX - I have a target for this move, but on Feb 22 I thought we could get a multi-day pullback to the 10sma before moving higher. This would be similar to what we saw in December.
SPX - We have had a 4 day sideways move to the 10sma, stronger than that dec drop, and another reversal higher Friday. Will we reach 2427 on this run? At this point in our timing, I would expect a dcl before getting that high, and then a continuation higher. The markets have been strong in this area of new highs ( no resistance) so time will tell. As recommended, a trailing stop would have worked very well.Read More
If you want to look good while you're performing tricks on the slopes, you definitely need to stick that landing. Let's see if we had that in Thursdays trading...
GOLD - We were looking for a higher high to give us a peak that could make this a right translated daily cycle. Gold stuck the landing with this break out, and the volume was encouraging.
If Gold continues to stick the landing, it should make it to this target area.Read More
The Fed Minutes were released on Wednesday at 2 P.M.. Was there any change?
SPX - No change here. We could use a pause if we are going to reach a target of 2400+.Read More
We've only seen one day of trading after a 3 day weekend in the U.S., so this report will just be a brief review of the markets and a few of the trade ideas discussed recently..
SPX - Nothing has changed here, we are seeing a strong move into new highs with no real resistance, I have targeted 2400 since the break out. It is getting quite over bougt and over heated.Read More
I wanted to put out a bonus report on Tuesday morning. Realistically we probably have enough on our plate, so if you are happy with your current positions, please just view this as a possible heads up for possible future trade set ups or a watch list going forward. In the past few months we have been trading Energy, industrial Metals like CLF, VALE, WRN, NAK, X, etc. We have been trading in the Precious metals sector ( I also encouraged readers to buy & just hold on to some positions from the December lows forward ).
You may also recall my special report in December on another sector that turned very bullish. We will discuss that a bit further here today, as well as what could be some more low lying fruit in another sector that may be sending out some bullish shoots. These are just extra trade ideas for the active traders. Let's take a look...Read More
For the weekend report, I often feel the need to review the Bigger Picture to gain perspective. I am going to do that this weekend too. To open this report, I'm going to start with a scare tactic. Yes, that's odd, but I see it all the time in the markets, and I believe that there is no better way to face your fears than to, well... Face Your Fears..
This Chart is an actual Real Bull Market that I have clipped for us to look at. I am calling it Gold ( though it wasn't) and it has a similar movement to what we just saw when the Miners ran higher in 2016 and peaked in July/ August, and then sold off. The Fear tactic is that we always hear "Gold is in a bear market and must drop below $1000 to re-set." Well, now I have heard that this was just a bounce and is an A-B-C-D down to $1000 in Gold & will put the Miners into single digits. Please read the chart.
Compare it to GDX currently - We see the big run up in 2016, The peak in July/ August, followed by a strong sell off. All very similar to the above chart. Are we in for a massive sell off? That is what I'm starting to hear again. "GDX has hit resistance and is just too weak to push through."
Now that I've got your attention - lets look at the bigger picture in all sectors of the market, and answer that nagging question that is being raised above.Read More
There are times when I feel like I can't even find a solid trade set up, and then there are other times when I feel like there are plenty to choose from. Right now, I feel like I'm seeing a lot of trade set ups. This Friday edition is going to feature some trade set ups after a quick review of the USD, NATGAS, and Precious Metals.. Read More
Sometimes building bridges by means of consolidation pave the way to higher ground. I will discuss that later in the report, after a quick market review..
SPX - Again, this is like a melt up phase, and if I were long I would use trailing stops and let it ride. That long bridge of consolidation has built up some energy.
This was eye opening...Read More
Tuesday had Janet Yellen speaking before congress, and the USD and Gold both actually acted as expected. That's a relief. Let's review the markets and then of course we have to discuss the day that Nak got Whacked. What can we expect next after that big reversal?.
SPX - The markets are on their way higher after a long consolidation. That consolidation gives energy to the move and even though the vix is low, I would just use a trailing stop and follow this higher. It is turning into a nice steady move higher at this point, and these can just melt upward.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.