Good question, Danny! That is what we will be discussing in the weekend report.
WTIC - Yesterday Oil broke the 200sma and recovered it , putting in a reversal candle.
I have a few thoughts about this...Read More
Last week I mentioned that the sideways choppy market action and sell offs that we were experiencing would eventually lead to bullish trade set ups. At this time, it seems that we are starting to see some of those good looking trade set ups. Along with the set ups we are also seeing some follow through on the trades that some of us have already been in. Let's review some of Wednesdays action...Read More
Next Wednesday we have the FOMC meeting. These have affected various sectors of the market in the recent past, so it may just be a matter of time before we see a change take place.
SPX - Consolidations build up steam and can make for a lasting run. These markets could run higher into the Fed Meeting next week.Read More
After the 1st round of the French Elections Sunday, we saw price break through many of the trend lines that we were watching.
SPX - This chart was from the weekend report showing that trend line resistance for the SPX.
And we had a break out on Monday, even if I use the peak of the spike on April 5ths reversal. We've seen daily cycles run various lengths, see the 2 boxes drawn below, and so this does have the ability to run a bit higher.
Lat's look at the NASDAQ...Read More
The 1st round of the French Elections are being held on Sunday April 23, and that may temporarily shake up the markets, but so far, things do seem to be lining up as expected in various sectors. Let's review ...
SPX - On April 19th we saw the SPX continue to be rejected at the 50sma. I mentioned watching that 2322.25, because a break out higher or lower is important.
SPX April 21 - No change yet. The RSI & MACD are improving, but no break out yet.Read More
If you were reading the 'comments' or the chat area yesterday, there was a lot of talk about STEEL and the STEEL STOCKS, so Fridays report will discuss that area and some probable trade set ups in that area and other areas.
STEEL - We'll start with STEEL itself. We have a weekly reversal and a swing low has formed on the daily chart. After the long multi-month consolidation, the weekly RSI is again above 50% and the Stochastics has reached an oversold level. This all looks good.
STEEL DAILY - The daily chart had a nice bullish push higher too, and right off of the 200sma.Read More
In yesterdays report, I was complaining about the boring 'put you to sleep' type of sideways action in the markets lately. Apparently that was the calm before the storm, because later that day we finally saw some pretty big changes take place all in one day. Something interesting occurred in the General markets, Oil had a big drop of almost 4% (!) and the selling in the many of the junior Miners that I had been pointing out picked up the pace too. Let's take a look at the markets and discuss the recent developments..
SPX - Not a lot has changed here, but I've mentioned that I'm a bit concerned with the XLF . Now there are new threats to the General Markets. The SPX remains under the 50sma and threatens to break below the prior lows. A break down could lead to a good sell off, and a break out higher could lead to a decent rally, but it is getting late in the 3rd daily cycle, so upside may be limited the longer time goes on.
This is interesting though...Read More
As mentioned in Tuesday mornings report, the Markets have been absolutely fabulous lately ( If you needed to catch up on some rest that is). Boring action in almost every sector is putting traders to sleep. let's take a look at what happened on Tuesday!
SPX - Here we see that the SPX, oh wait, that's probably just a day trader as of Tuesday...
SPX - Here we see that the SPX has basically gone sideways for 2 months. Tuesday it was held back by the 10sma again. No real change here.Read More
Something interesting taking place in the General Markets
SPX - Here we see the ICL in November and 2 dcls that followed. Obviously the markets have been relatively strong, because those dips down into their dcls have been shallow. Over the last 2 weeks I mentioned concerns about the XLF and then the SPX broke below the 50sma last week. The 'timing' dictates that an ICL is coming due and since the XLF has been weak, so I would expect more of a dip now or soon. At this point, I'm actually noticing some interesting developments taking place here too, so let's discuss that. Notice how the recent consolidation does look similar to the last one at the dcl...
Note: That last dcl has not been broken and a break out here is not out of the question, and here is why.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.