OCT 10 Midday Sold Partial position in APT, liberal stop set on the rest . I dont usually post my “Sells” , I leave it to the reader to trade at their own risk / reward formula. I just wanted to point out that THIS is now extended 150% above the 50sma, […]
Author Archive for: Alex - Chart Freak
About Alex - Chart Freak
I’ve been a full time trader for well over a decade and began trading in the late 1990s while working in management and sales at a well-known aerospace company. As my style evolved, so did my success, and it allowed me to leave corporate America to pursue my passion and trade full time.
Entries by Alex - Chart Freak
OCT 10 —Have you ever been skating on ice and suddenly you notice a big crack? How about a HUGE CRACK? We may want to keep that PANIC BUTTON handy. THIS just raised its ugly head. CAUTION WARRANTED!
Oct 10,2014 As I start writing before 7 a.m., Futures are down quite a bit
I Got a funny email, it said, "With this sell off- When will you know that you're wrong?" - LOL Now I assume that the writer just worded that wrong and was really trying to say, "When would you know if this sell off was more than the normal correction that you expected?" OR Was that just a Freudian slip and the writer is telling me I AM wrong - when are you going to know that ? Let me put it this way, I am watching closely and the CNBC TOPIC is "Is this more than a normal correction? Or Is this going to be a Panic Sell off?
When everyone expects it before it happens, and FEAR is everywhere, they are usually wrong. The best way to follow it is....TO THE CHARTS!!
QQQ still looks strong. This is NOT a chart of Weakness (So Far)
Despite the cries of things getting scary - The QQQ on this next chart looks like every other correction before a strong rally
Oct 9, 2014
WELL!!! I thought that I should offer up an idea or two intraday since the color RED is the color of the day . I do NOT want to become a 'BUY & HOLD' or 'WISH & HOPE' kind of trader...I look to see if I can see whats happening and when a trade starts to act in a way that I didnt expect, I have to try my best to numb the "EMOTIONS" and just look at the facts. So I snapped this PIC of an intraday chart , the sell off of GDX today.
Its NOT meant to be grasping at straws or "HOPING" I'm right...its just what is happening , What I see right now.
As you can see, GDX and GDXJ have pulled back to very 'RED' for the day
- But they are only about 1/2 way into that move off of Lows yesterday, almost a "Test" of the top of a cup.
OCT 9, 2014
WAIT! Is the train leaving the station again? Should I jump on - or - Is this quick reversal just a Fed induced pipe dream , only to suck in longs and pull the rug out from under them? Those are good questions and who can know for sure? No one, really. HOWEVER if we look for "Clues" - maybe it can shed light on the matter. I am going to continue on the theme that I started in the report entitled " Its An Illusions" (Click "illusions" to read it) Illusions .
In that report , I was discussing how it seems that while everyone is being encouraged to "Look at GOLD & SILVER" crashing, Some Miners were holding up, apparently being accumulated. I want to re-visit that idea here, since the selling has escalated since I wrote that on Sept 25th, 2 weeks ago. Have things changed much? Lets see....
GDX certainly has joined in the sell off type move. You can see it bleeding 5 weeks in a row here
(This wkly chart was as of last week).
And look at this chart below!
Oct 8, 2014 "Timing Is Everything"
- Have you ever heard that expression? Well today, Timing was both Good and Bad for me, but thankfully for me (and everyone else too)...there is always a little more time. I was drawing up charts this morning for another Bullish Report. This was how my day started and how Timing was both Good and Bad. In this weekends report here at Chartfreak, I was writing about expecting a market reversal higher. SO MANY people were calling for a steep sell off. 'October Crash' I kept hearing and I wrote about the group think in the weekend report. I heard that a 20% correction was coming on CNBC yesterday and I saw this sentiment reading below (THANKS TO TICKER SENSE) as too bearish. I just cant get comfortable following the crowd .
And talk about BEARISH - Metals & Miners were going to $800 to $1000 within a month. I have been mentioning that I expect those MEANINGFUL Lows to come anytime now, and for several reasons. Yes, Selling could continue later, but I feel that we are at an exhaustion point in both Cycle "Timing" and other areas. But wait- What report? I didnt post a report this morning, did I? ...
OCT 7, 2014
I thought I would just throw a couple of ideas out there, possibly for your watchlist if you have one. In my last report I pointed out the set up in ZEN as looking like this (Chart below). Notice that, as an I.P.O. it experienced rapid buying and then just went sideways (no Sellers) consolidating those initial gains. Once you break above that area, another run up can take place, since no one is selling , everyone is along for the ride, and momentum buyers can jump in. I've seen this pattern a lot, and as long as a company is doing well, the results can be higher prices.
With that in mind, take a look at this next chart...
OCT 5 weekend report
I love the way the above picture captures the theme of GRACE UNDER PRESSURE ( Picture Credit to Rush & Hugh Syme).
Ermest Hemmingway wrote that "Courage is Grace under Pressure" and for the past few weeks, the markets began selling off, thus pressuring 'buy & hold' investors. Remaining Graceful while enduring the "Pressure' of the markets selling off allows one the "Courage" to make good decisions. I feel that most readers here are that way. For protection , We actually trade with stops in place ( be it mental or a be it a hard stop), looking forward to pullbacks in hopes of buying at 'discount prices'. While I haven't see all out panic,I have seen CNBC interviewing many lately asking, "Is this it? Have the Markets topped & is October going to be the month of a crash?"
The question is...."What were you doing?"
On Thursday , OCT 1 , I Tweeted this SPY CHART , pointing out OCT 2013 selling off to the 26 WMA (Red line) . Would we get that 193 area ?
We Did get that red line (193) and it looks to have reversed. Yay for the chart & reliability of these markets so far.
If you bought a nice set up in that reversal , you displayed Courage and Grace under Pressure...
Oct 3, 2014 Just a quick note….It looks like its going to be a good day for traders. Yesterdays late day reversal in the sell off of the markets has set up some very beautiful charts. Looking at the 50sma, many of the recent pullbacks landed and reversed there. It was a time to start […]
Thursday Oct 2 , 2014 Mario Draghi is speaking today , and likely it will affect the markets. We have JOBS Report Friday too, so the next few days can affect, even change the markets. The charts are very extended in some areas and almost calling for a little change. Nothing is certain, but lets look at some charts and see if there are clues what kind of changes could take place. We can start with something that certainly could be moved by Mario...
The Euro - $XEU is due for AT LEAST a bounce and may have completed 5 waves for the Elliott Wave fans
The opposite of the $XEU is the $USD. Is that over-extended to the upside? ...
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.