DJIA - We had our 1000+ Point bounce
I had been discussing the Fib Retracement , sentiment, timing for an ICL, Put Call ratios, etc, so we knew that we were due
DJIA - I mentioned that it could be choppy or V-Bottom, but the lows should hold, so you can buy the reversal or buy it if it dips, with a stop under the new lows.
DJIA - The Dow dropped 600 points, and recovered by the close. So...Read More
The DJIA was up over 1000 points yesterday! Now that's a bounce, in fact, I believe that it was the largest up day in the DJIA....Ever. I want to review what I mentioned in my last report. I had about 6 charts of the General Markets, so if you need to go back and review them all, I had a few in the beginning, and a few at the close....
I pointed out the Capitulation type volume, 50 % Fib retrace, the 200 weekly MA, etc . and then stated...
After that SPX chart, I wrote this:.
" When I look at the Equity Market Sentiment ( FEAR AND PANIC), and I look at the Puts Call ratio, I Look at the cycle count, the Fib #’s, The number of stocks trading below the 50 & 200sma, and a number of other things etc etc etc, it really looks like we are very close to an ICL. I will have to watch how the first 2 daily cycle play out from there, but a snap back rally seems overdue. A 1-2 month rally in the General Markets would also fit in with a pull back for Gold into the next Gold ICL.".
Wednesday, we saw the DJIA rally up 1000 Points! - Well, that sounds pretty awesome, but it does feel like the Dow has also been giving up about 600 every few days, so is this what we have been waiting for?
Let's discuss how things seem to be LINING UP...Read More
Monday was only a 1/2 day of trading, and in my weekend I mentioned that I found something interesting pertaining to the Miners that I thought was important to share at this time, so I want to devote most of this report to that discussion.Read More
It has been reported that past week was the worst December in 10 years for the General Markets. I am hearing that depending on how it ends this week, it could even become the worst drop for the Dow in decades..
This week I was thinking about the average person and their 401Ks. Why? I went to lunch with 2 friends on Thursday, and they said to me, " I saw the Dow was down 600 points! I know it'll recover, but wow, that is the 3rd time that I saw that recently. This is just normal sideways stuff, right?" Hmmm, Since October, the markets have plummeted and erased all of 2018's gains. Even though most know that the markets are shaky or 'having a rough spell' as my other friend mentioned, I just realized that most do not know that the final quarter of 2018 wiped out all of 2018 and then some. Depending on how their 401k is set up, there may be an awful lot of shock when the next quarterly statement is viewed.
I showed my friends the chart below as of Thursday on my phone and they were shocked. "I thought we were still chopping around at the highs?", my friend Danny said. Let's look at some charts....
SPX WEEKLY - You can see that last February -April, the sell off was steep, but this one has been 2x that drop. It is now approaching the 200 weekly ma as a possible support. This chart helped my friends to see that the last 3 months of 2018 may have wiped out their entire year of 401k gains and even half of 2017, depending on how they were set up. They were shocked and unaware, despite hearing about a few 600 point drops on the news.Read More
Well, it started to get choppy and difficult in various sectors a few weeks ago, and then we went into full sell down mode in October for the General Markets. Miners were sideways and choppy, forming bases but difficult to hold at times, and suddenly many of those bases have been breaking out higher. It has been a rough ride in the Markets, even the crash test dummies are complaining, but today is Friday, the last trading day of the week.
We will be heading into a weekend that is followed by a 1/2 day of trading Monday ( what's the point?) and a closed market Tuesday, so let's take a look at a few things before this week of trading finishes up....
I think that we knew that the Fed would raise rates, and I think that we had a good idea that there would be a'Reaction'. So let's take a look at Wednesdays market action ...
SPX - This was my chart going into the FED WEDNESDAY. Day 34 Tuesday.Read More
Today is the FOMC Decision, and even though the rate hike is supposed to be figured in, These markets are stretching out and could see a sharp reaction when the time comes. Let's take a look at Tuesdays market action....
SPX - This small candle with a new low on day 34 allows for a swing low with a move above Tuesdays highs (2573.99). If the FOMC Decision changes the markets direction, it is possible that we will have a DCL & even an ICL.Read More
The Dow was down another 500+ Points, and we see the general markets are at new lows again. This is not a surprise to us, I covered my thinking in the weekend report, so lets do a review and how things are playing out. We also have the FOMC meeting this Wednesday, so we will touch on that...Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.