Just a quick report this morning, because today is Friday and it is the last trading day of the week.
NASDAQ - Yesterday I was watching this slight push higher after the sell off, just in case it was a bear flag. The 50sma would be watched for support or failure.
QQQ- About an hour before the markets closed, I posted this chart in the comments / Chat section and pointed out that this actually could be finding support with a reversal at that 50sma. A set up like this can be bought with a stop right below support. TQQQ looks just like this too.Read More
This is yet another very large report, designed to help you to see the many things taking place in various sectors.
Recently using the QQQ I pointed out that prior drop into ICLs did reach the 50sma
NASDAQ - The Nasdaq didn't drop that much after the Fed announcement, but it is possible that it will seek out an ICL now, since we are late in the intermediate cycle length. That would mean that we are currently seeing a Bear Flag.Read More
We've been looking for and discussing clues heading into todays Fed Decision. Let's discuss Tuesdays action.... Read More
What is right down the middle? As seen in the weekend report, the analysis for GOLD, SILVER, and MINERS falls into that category, but also the emails that I get from readers seem to be split between Bulls and Bears too. Let's take a look at what happened on Monday.
NASDAQ - 2 charts from the weekend report .
#1 - We tagged the 50sma on a deeper or more prolonged drop
#2 - I pointed out that the NASDAQ held up rather well at the 34 sma on quick short pullbacks. 'BUY THE DIPS' type drops.
The NASDAQ on Monday it hit ( Slightly broke) The 34 sma and reversed, closing above it. Let's see what Tuesday brings, but it is possible that the selling has exhausted for now and will produce at least a bounce. A loose stop below the 34 sma may add safety, however...
QQQ - The 50 sma has held prior drops, and you have to admit, the volume on this drop is pretty serious. That is some strong selling volume. This may or may not be a buy the dip drop. We may drop into an ICL and then resume the move higher. Prior ICLs broke the 50sma in 2016.
The week before the Fed decision had a good amount of action, so let's take a look at the week before the Fed Meeting and see if it gives us any clues about what we might expect next week. Hint Hint: Did you see the reaction in the XLF as the markets sold off?
XLF on May 31 - This is what I have been watching for weeks. That 50sma was capping the financials and they looked pretty bearish.
XLF Now - As mentioned Friday The XLF & BKX broke out Thursday and had follow through on Friday. BANKS have done well leading up to and after a Fed Mtg with a rate hike. Look at what happened before & after the DEC 2016 Rate Hike, which was also very much anticipated. Now we see that type of action again.
Now look at the NASDAQ - at 1:30 Eastern time, I posted this chart in the comments/ chat section and declared that 'so far the sell off was similar to many of the recent ones'. Maybe the 50sma would be a target down the road? Did it remain that way?
WHOA! It dropped all the way to the 34sma all in 1 day and then bounced. This is an area that supported price in the past. At one point it had erased over 2 weeks of gains in 1 afternoon!
What am I looking at now?Read More
This is going to be a very very long report for a Friday, filled with many charts, so let's get right into it...
USD - We are likely seeing a swing low form in the USD, so the Dollar should move higher and this could be what we have been waiting for to cap Gold and give us a pullback. I'll cover this more in the weekend report.Read More
The past few reports discussed some of the similarities and differences taking place in the various market sectors right now. We will continue to examine some of these similarities and differences today.
SPX - Mini bull flag type set ups keep pushing these markets higher. It is only day 13 of this daily cycle and it can continue to move higher.Read More
I saw signs of a change taking place on Tuesday, so I sent out an intra-day report to quickly discuss some basic trade ideas until I could spend some additional time going over the charts and trying to piece some things together. This report is going to focus mainly on the changes that I have already witnessed taking place.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.