SPX - We still have a wedge that has formed. These usually break down, so with the SPX at the 50sma and a wedge, I would think that we may pull back for a few days.
That could be a 1/2 cycle low and it is not uncommon...Read More
SPX 1 of 3 - After the pause that we expected under the 50sma, the equity markets actually look ready to break higher already, so
I want to show you these 2 charts ...Read More
Monday s market action did not change the expectations mentioned in the weekend Big Picture Review, but the trading has been very good and most of the recent buy opportunities continue to play out. Lets do a Tuesday review....
QQQ - We expected this pause and...Read More
This is the weekend report, where we can monitor the progress that the various sectors of the market have made, and what we may expect going forward. Since I give a more detailed day to day update in the daily reports, I often focus mainly on the Big Picture in the weekend reports by using the weekly or Monthly charts. This week , however, I will start with the daily charts in a couple of the sectors, to include a close up of where we are now, and then we'll get into our Big Picture Outlook..
QQQ Daily - We are pausing at the 50 sma, as expected. Will we go sideways or pull back? It really shouldn't matter, at day 12, I think that we should still break above the 50sma in the first daily cycle and maybe back test it on the dcl later...
QQQ WEEKLY - This is an area that POSSIBLY may eventually become an important topping point. We are watching this s things unfold. If the FED stops raising rates in early 2019, I wouldn't rule out that the markets can hang in there a bit longer. FED PROPPED. I still lean toward a H&S top though, with highs in place.Read More
Gold has been on a run during this market correction. There is more to the story and I’d like to show you.
Before we get started, lets look back at $GDX and $GDXJ how they closed out 2018…
THE MONTH OF DECEMBER HAS NOW CLOSED, AND THERE IS NOTHING BEARISH ABOUT THIS MONTHLY CHART. THIS IS A VERY BULLISH LOOKING CHART! THIS LOOKS VERY BULLISH FOR 2019!
GDXJ MONTHLY – December has ended and this is the first Positive Month since MAY! I pointed out that down trend line last weekend, and it has been broken! Again, I see NOTHING BEARISH about this chart. 2019 Could be a very profitable year !
(The following is a sample of Alex’s work from the past week)
GOLD LIVE WEDNESDAY JAN 9th- Gold has been dropping, but it is mild at this point. I’d like to see more of a drop.
ALO – In December I pointed this out as a lagger that Popped and was a buy. I pointed out that these bases can actually produce a nice run .
ALO – It ran and is now Bull Flagging. I then pointed out other stocks that resemble this set up, and mentioned that they could be bought as those ‘lagging stocks trying to play catch up’ ( Advice: a small basket to avoid individual risk, and you can also use a small position size).
NGD – Here we go, JAN 3rd, a similar base as ALO was pointed out here and looking ready to go. It popped 10 % here and I was looking for a nice run to the 200 sma as possible over time.
NGD – Boom Boom Boom- it is playing catch up, even on days when GDX & GDXJ were down. So I see that as an indication that some of these will act on their own, as buyers step in to accumulate.
GORO DEC 31 – So I used this chart and said that it looks similar to ALO and NGD, but it needs a bit more sign of strength. I wouldn’t just buy a 1 day reversal, but…
GORO – It started pushing on that 50sma, and Tuesday it POPPED above it. THAT IS A BUY. GDX & GDXJ were down at the time, they were pulling back, but GORO was being bought up. This is a buy, but I did notice the DEEP RED CRASH DAY every 3 months before the base (red arrow). That MIGHT be earnings, so be aware of the earnings date.
HL – HL was a BUY on JAN 3 too. It has lagged, and it was a Silver stock still at the very lows, MACD rising. Low risk, with a stop at the lows. $2.47
HL – It started flagging sideways and Tuesday HL has a 10 % POP. Again, this happened while GOLD, GDX, and GDXJ were down. SO IF CYCLES SAY GOLD & GDX Need a pull back, maybe some of these that didn’t join in on the run higher in December (laggers or Base building) will still just do their own thing in January?
HL – It could easily run, crawl along the 50sma, and break out as shown here.
GDX – If we can get a drop, it might only look like this, but so far GDX got choppy again. Believe it or not, this is 3 weeks sideways. It is simply going sideways along the 200 sma now, and that can be a Bullish Crawl. IF GOLD BREAKS OUT HIGHER, THIS CRAWL ALONG THE 200 SMA MAY BE THE ONLY PULL BACK THAT WE SEE ALSO.
CDE – So some Miners do look like they could pull back for a buy opportunity. CDE could tag that 50sma unless it just breaks this apex higher.
Chart Freak Membership
Alex has been successfully writing a daily newsletter service for nearly four years now and is considered one of the best traders of precious metals miners, energy/uranium stocks, and biotechs. This is your opportunity to join his service as a member and follow along as we enter the next bullish gold Cycle higher.
If you would like to find out more about the service or sign up, please click the buy option for more details.
Today is Friday, the last day of trading for the week. It really has been a great couple of weeks of trading , so let's discuss a few things...
This was in yesterdays report....
QQQ – I am also starting to see what look like rising wedges in The Nasdaq. This can push higher, but keep an eye on it. These can be short term bearish, and often break down, an example of this was seen last February and April.
QQQ - The QQQ tagged the 50ssma and the wedge remains in view. Read the chart.Read More
As was mentioned in yesterdays report, a variety of the markets sectors have been climbing higher and trading has been excellent. Let's examine our current markets...,
This was in yesterdays report-
SPX #1 – If this is an ICL, we should have a month or two off of the lows, but we are seeing price enter ‘resistance’ areas. It CAN push higher, but we are nearing an area that may offer resistance and stall price too. The markets have been straight up, but going forward they may get choppy.Read More
As the various sectors bounce out of their recent lows, they continue to do pretty good on the Climbing Wall. Some may be climbing the so called 'Wall of worry'. Let's take a look at the progress....
SPX #1 - If this is an ICL, we should have a month or two off of the lows, but we are seeing price enter 'resistance' areas. It CAN push higher, but we are nearing an area that may offer resistance and stall price too.Read More
In The last quarter of 2018, various areas of the markets began drying up and going stale. We saw the equity markets & Oil crashing down and many good set ups that would form would quickly fall apart. Trades in Miners and some of the Medical Marijuana companies were playing out ok, but there was definitely a choppy vibe in the GDX & GDXJ area too, into December..
Suddenly, we have seen bottoms develop (temporary or longer term bottom remains to be seen), and along with these bottoms are set ups that are finally working out, and many are working out very well. Let's take a look at Mondays action....
REMINDER: At the end of December, IN MY REPORT, I mentioned that this reversal candle on day 39, was a buy in technical analysis, with a stop under that days lows. If an ICL is in place (Day 1) , those lows will not be broken for weeks. So far, this is playing out well. You can see that I said that " This is a BUY" in that December report.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.