ES Journal Archive (2011)

Status
Not open for further replies.
Quote from Laissez Faire:

Nice finish by the T-Day boyz :D

Why did they not enter earlier? :)

I entered long @ 1291,50, 2:39 PM with a stop @ 1289,50. I first placed a limit order @ 1291, but when I did not get filled, I chased.

Stopped out on the exact tick on this trade. If I had been patient for my 1291 fill, I would probably have stayed in the trade.

What`s worse is that I reversed and shorted @ 1289,50, the exact bottom of the swing low.

This would NOT have been a bad trade if the market immediately continued in my direction. What happened here is that after considerable down momentum and repeatedly significant negative TICK readings, price slowed down and stalled.

This was my perfect, "Get the hell out at B/E or with a 1-2 tick loss, instead of waiting for your 1,5 point stop to get hit" :D

This was my main lesson for the day. Monitor price in real time and if momentum was expected for my trade idea, but did not come, get the hell out (unless I have a stop above a swing high or such). This was not the case here either way.

-3,5 points for the day (did not finish my trading plan and preparations, so I`m on SIM this week as well).


There was an IHS I posted about earlier with shoulders right under 88 and neck around 90.5 that projected to 95.5.



fwiw 88 was also the 50% level from the last r10 83 - 93 move.

It turned into an ascending triangle with higher lows and the same highs which is bullish as well.


The afternoon was hard to trade with the chop but the higher lows gave it away.


Just curious why you chased on both trades instead of being patient ?


Often it is best to avoid chop because it leads to boredom and forcing trades that are not high probability.
 
Quote from candles:

out - 1291 for +12

:D

will look for a drop of 5 or so points and then long for another +12 or so, rinse, and repeat, lol

This is more like it! Crystal ball trading!
Banked a plus 12, called for a 5 point drop and a 12 point rally!

We dropped 6 points from your exit and have since rallied nearly +10!
Please tell me you got back in long!!
This is free money, peeps!! Amazing that only you and iseefedpeple seem to be taking advantage.
I may being posting a few calls again soon. Need to show you two how to do it PROPERLY! ;)
 
Quote from candles:

thanks. 3 big winners in a row now.
Not got back in long yet for the record. Tempted though. Will post when I do.
Good luck

Good stuff candles! way-to-go!
 
Market continues to defy counter trend technical analysis. Just wanted to thank Bernanke and the shorts for making it all possible your contribution is appreciated.
 
Quote from volente_00:

que esta pregunta ?


me gusta diez

Quote from ThePredictor:

Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and prevention. Eudaemon is able to attach to any running process, and redirect execution to a user-space emulator that will dynamically instrument the binary by means of taint analysis. Any attempts to subvert control flow, or to inject malicious code will be detected and averted. When desired Eudaemon can reattach itself to the emulated process, and return execution to the native binary. Selective emulation has been investigated before as a mean to heal an attacked program or to generate a vaccine after an attack is detected, by applying intensive instrumentation to the vulnerable region of the program. Eudaemon can move an application between protected and native mode at will, e.g., when spare cycles are available, when a system policy ordains it, or when it is explicitly requested. The transition is performed transparently and in very little time, thus incurring minimal disturbance to an actively used system. Systems offering constant protection against similar attacks have also been proposed, but require access to source code or explicit operating system support, and often induce significant performance penalties. We believe that Eudaemon offers a flexible mechanism to detect a series of attacks in end-user systems with acceptable overhead. Moreover, we require no modification to the running system and/or installation of a hypervisor, with an eye on putting taint analysis within reach of the average user.

Can you rephrase the question?.
 

Attachments

Quote from eudaemon:

:confused:

Congratulations mr demon. You have reverse engineeered what I have given away for years on here. Now my edge is gone and I will no longer be profitable.

:(
 
Quote from volente_00:

Congratulations mr demon. You have reverse engineeered what I have given away for years on here. Now my edge is gone and I will no longer be profitable.



:(

Or, on the contrary, you'll be more profitable than ever, thanks to the market fundamental paradox.:eek:
 
Status
Not open for further replies.
Back
Top