We traded LABU ( XBI, IBB) in June and made some quick gains. I believe that it may be time to go biotech again.
XBI - After a solid run higher from a bullish W pattern consolidation, the XBI & IBB has formed a bull flag. Both broke higher with increasing volume yesterday. This can be bought here with a stop under the bottom of the flag. I want to point out that this Flag MIGHT turn into a longer consolidation pattern too. See the next chart...
XBI JULY 5th - I noticed that some readers were shorting XBI & IBB in early July, so this was my chart from July 5th showing that a bull flag could form, not making it a profitable short. It could run sideways for weeks until the 10ma on a weekly basis catches up. My target has been the former highs around 90 .Read More
The climb is hardly ever straight up..
SPX - We were anticipating a trend line break and a close above the 10 sma to help confirm a dcl. We got it. The last time that this happened, the gap filled one month later.Read More
I've been posting a variety of trade set ups in the past few reports, and we are seeing some nice follow through. Let's take a quick look at a few Market Sectors and then discuss more trade set ups, and current trades in the works.
NASDAQ - The NASDAQ closed above the 50sma and the 10sma and that is a bullish start to a new daily cycle. We do need an overhead trend line break, but I wouldn't wait that long, I would go long on this close above the 10 & 50sma and just keep an eye on it until it gets a bit higher.
SMH - This is a bullish chart. It is ahead of the NASDAQ, because it did break an overhead trend line already. This is a buy here above the 50sma.Read More
This is a long report. I wanted to discuss Gold & them Miners in detail in this report. I have mentioned that I am seeing various interesting things in that sector over the past few weeks, so let's just briefly review the general markets and go right into Precious Metals.
SPX - The actual lows were 6 days ago, and we do not even have a swing low in place yet. I would say that a close above this trendline & the 10sma should signal a dcl occurred, and then one could go long with a stop below that 50sma.Read More
SPX - From Fridays report, this shows that the SPX could be forming a megaphone pattern as it sat around the 50sma.
SPX - Friday the SPX moved higher off of the 50sma, but has a new daily cycle started 6 days ago?
This is what I would look for going forward...Read More
It is Friday, the last trading day of the week. Jobs numbers will be released, along with the Natgas Inventory numbers. I like to remind 'traders' and 'investors' that today is the last day to be positioned heading into the weekend. I am holding several trades through the weekend, but I have been over 50% cash for a while, waiting for a solid buy set up to form in the Precious Metals sector. Enjoy your weekend!.
SPX - Closing below the 50sma could be a shake out. It was the last 3 times the SPX closed here. Either we sell down into the grips of a deeper ICL sell off, or look for a reversal and a close back above the 10sma ( not just the 50). Jobs numbers could affect the general markets.Read More
NASDAQ - We did see a small reversal , but we are still under the 50sma. I just don't think that we are there yet, so I expect further downside.Read More
With only 1/2 day trading on Monday, did anything really significantly change for todays report? Nothing has changed from my expectations, but we did see some decent moves, and they are worth discussing, so lets begin...
DJIA - This was in the weekend report. An eventual drop to the 50sma or more.
The NASDAQ was what was really looking rather toppy. We have not seen the kind of deep selling that I would be expecting now ( ICL).
SO I used this chart in the weekend report to point out 1 of 2 possible drops, and I pointed out what looked like possible 'distribution' volume at the highs.Read More
With only 1/2 day of trading on Monday in the U.S., wedged between a weekend and a holiday Tuesday where the markets are closed, I think that we can expect light volume trading on that Monday. Many people may have just checked out and gone away from Friday through Tuesday, so let's just discuss where we are with the markets..
DJIA - The markets have started another sideways consolidation or pullback again, however...
This does look a bit like 'distribution at the highs' with that heavy volume. Please read the chart.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.