SPX - We saw the markets drop on Wednesday and start to recover as the day ended. I am expecting a dcl, and I do not think that this was it. We could bounce & drop or just continue lower, in my opinion.Read More
The markets still look a bit mixed, and I am expecting a dip into a dcl, so let's start by taking a look at the current set ups.
DJIA - I am expecting a dip into a daily cycle low and the DJIA appears to have a bearish rising wedge forming. There is room in the apex for another pop, but it should break down from here, since we are due for a dcl. Again, the DJIA is only 1/2 way to the Jan highs. After a decent run out of the last DCL, it has been a bit choppy.
It looks like we are back to Mixed Markets, some sectors stronger than others, but since I am expecting a drop into a DCL, I would be fairly cautious in all areas short term.Read More
Can't you hear the Thunder? There are plenty of rumblings out there in the land of the Miners. They have finally decided to really Join Golds sell off in earnest. We'll discuss that in the precious metals section after a quick market update..
SPX - I've been expecting a drop in the general markets, and on day 31, closing below the 10sma, this is likely a drop into a dcl starting.Read More
Yes, that Theme Picture is a real un-doctored Gold Chart that I captured 'live' one night at midnight as I was writing my report. In this report I wanted to show you some things that You may find quite interesting about that time period....
You may not even remember June 3, 2016 or June 23, 2016, when they actually should be very hard to forget. I want to tell you the story, so that you at least you know what possibilities do exist 🙂 I write my reports later at night, and Gold was slowly rising from $1250 one night when I started writing it. Well, it started ramping up and just kept going, rising up almost $90 to $1241.90, as captured by me in the Theme pic live late that night. It did NOT stop there. It actually jumped $109 points that day. Let me tell you a story ....
In May 2016, Gold sold off into an ICL. Interestingly, it dropped from $1310 to $1200, and you could say that from May 17th to the end of May it was all red, red, red, day after day. THAT KIND OF SELLING GETS TIRING 🙂 I say that because we just sold off from $1314 to $1204 too, almost the exact same amount (but we took 2 months to do so, VERY TIRING). Back to 2016, we had our ICL in place at the end of May, but it just went sideways for 2 days. On day 3, or 4 days after the lows were in place, Gold went Boom! It took off, rising up almost $40 in 1 day, and kept on going for 2 weeks. After a brief pull back, BOOOOOOOM! That Pop of $110 followed..
THIS IS GOLD NOW, and we also just sold off from $1313 to $1204, it has just taken longer. When the contract changed to December, this chart was altered a bit, so I will show the Spot Gold chart too, for accuracy. It shows the NEW low that Gold traded at when it hit $1204.
SPOT PRICE - 2016 took 1 month from 1300-1200, but this has taken 1.5 months
We will cover the General Markets, Oil, The USD, etc. next, but then I will have PART 2 of this discussion at the conclusion of this report. At that time, we'll discuss the current set up in the Precious Metals sector. It is an important conclusion to this very interesting story. Enjoy 🙂Read More
That theme picture seemed funny, because it seems like day after day the deterioration has been relentless in that sector. Actually, many Miners do not really look that bad, and I will point out a couple of Miners that are setting up rather nicely too. We'll be discussing the General Markets , Oil, The USD , and Precious Metals for the final trading day of the week.
SPX - So the SPX is near the highs of January and we have resistance up here. We are coming due for a drop into a DCL, but this became a right translated daily cycle, so we can expect a drop and then a return to these levels. The channel has been a good guide for DCLs so far.
SPX - Stepping back, we see a bearish rising wedge. The Apex is actually about a week or two away, so this could go higher, but with the purple & blue line as resistance, it may get rather choppy and then drop.Read More
WTIC - Almost 1 month ago I pointed out that I was expecting a Bounce from here, but that it would stall and drop as drawn (possibly to the 200sma).
WTIC - Oil bounced & dropped as expected. I now expect this drop to take out the lows of the DCL ( The blue arrow) and form a failed daily cycle, eventually seeking out an ICL. I wouldn't be surprised now if Oil breaks below the 200sma in a shake out too.
THAT SAID, For those that are interested...Read More
That was what we wanted to see in Miners, so we'll discuss that in detail shortly, right now let's start with a market review...Read More
SPX - The SPX actually made a new daily cycle high on Monday. That is a peak on day 26 so far, and that leans toward being R.T. , but this also looks like it wants to continue higher. Prior highs and the upper trend line is a bit higher than current price. SPX looks like it wants to run to the circle.Read More
In the weekend reports, we take a step back and try to look at the big picture. It looks like we are VERY CLOSE to some changes. Let's take a look...
SPX WEEKLY #1 - I have been discussing this divergence. It is not a sign of strength at the highs, though the big picture is obviously a bull run. Bull runs can & do pause and falter as the consolidate recent gains, see 2015 into 2016. This can take months. Read the chart.
SPX WEEKLY #2 - Again, Bull runs can go choppy and difficult for weeks, months, even years, as seen here. Read the chart.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.