Thursday, September 8, 2011

So What Is a Heikin-Ashi chart and how does it look like?

Heikin-Ashi chart looks like the candlestick chart but the method of calculation and plotting of the
candles on the Heikin-Ashi chart is different from the candlestick chart.
In candlestick charts, each candlestick shows four different numbers: Open, Close, High and Low price
(It is recommended to learn the candlesticks first) and each candlestick is independent and has no
relation with the previous candlestick.

But Heikin-Ashi candles are different and each candle is calculated and plotted using some information
from the previous candle:
1- Close price: the close price in a Heikin-Ashi candle is the average of open, close, high and low price.
2- Open price: the open price in a Heikin-Ashi candle is the average of the open and close of the
previous candle.
3- High price: the high price in a Heikin-Ashi candle is chosen from one of the high, open and close price
of which has the highest value.
4- Low price: the high price in a Heikin-Ashi candle is chosen from one of the high, open and close price
of which has the lowest value.

So candles of a Heikin-Ashi chart are related to each other because the close and open price of each
candle should be calculated using the previous candle close and open price and also the high and low
price of each candle is affected by the previous candle. So a Heikin-Ashi chart is slower than a
candlestick chart and its signals are delayed (like when we use moving averages on our chart and trade
according to them).

What are the advantages and disadvantages of this delay?
This delay has made the Heikin-Ashi candle as a good indicator for volatile currency pairs like GBP-JPY
because it prevents us from rushing and making mistakes amd trading against the market.
Read More......

What Is Heikin-Ashi and How to Trade with It?

In forex or stock market, we can make or lose money when the price goes up and down. We need to be
able to predict the direction of the market. Different traders do this using different methods but for most
traders, technical analysis of the price charts is the easiest way. So they spend a lot of time to learn
technical analysis.

In fact, technical analysis was invented and introduced by Japanese traders and by the invention of the
candlesticks. Those who are familiar with the candlestick charts know that it is the best and fastest way
for understand the condition of the market and the psychological situation of the buyers and sellers.
Japanese traders didn’t stop improving their technical analysis methods and tools. They worked a lot
and tried to make the technical analysis and price prediction easier and faster and Heikin-Ashi chart that
came after the candlestick chart is one of the several different achievements of Japanese traders.

I can not say that you can predict faster using the Heikin-Ashi charts but it is easier than candlestick
charts. In this article, I explain about the Heikin-Ashi charts signals and analysis and will compare it with
the candlestick charts and then talk about my personal opinion about Heikin-Ashi charts and the way
that you can use them in your trades. Read More......

Tuesday, August 30, 2011

Windows 8 Black Screen of Death - BSOD Evolves

Evolution will reverberate from the surface to core of Windows 8, and apparently will also introduce an overhaul for one of the trademark components of the operating system, the Blue Screen of Death.

The good old BSOD moniker will survive without any problems, as will its inherent connection to a critical Windows system error.

However, according to information available from the latest leaked copy of Windows 8, a Milestone 2 release, Microsoft has opted for a monochromatic alternative to the much derided blue nuance associated with crashes in Windows.

If the changes introduced in Windows 8 Milestone 2 (M2) Build 6.2.7955.0 stick, then users should get ready for Black Screens of Death and the retirement of Blue Screens of Death.

A leaked screenshot of the new Windows 8 M2 BSOD was followed by a video which illustrates the new Windows system error screen in action.

The old Blue Screen of Death was getting old if you ask me, not that customers have managed to see many of them if they switched to Windows 7.

So a change in the manner in which Windows crashes are reported to the user is welcomed, I dare say, although blue or black, users are bound to dread coming across any BSOD.

Considering the advances in terms of stability introduced in Windows 7, and assuming that they will continue in Windows 8, especially around driver errors, the overall reliability of the next generation of the Windows client should only increase.

Having run Windows 7 on multiple machines, including all my home computers, I have to say that BSODs have become somewhat of a rarity. I sincerely cannot remember the last time one of my computers crashed with a Blue Screen of Death.

It’s only naturally to expect continued investments in reliability and stability with the advent of Windows 8.
Read More......

Wednesday, July 27, 2011

Belgium UFO Mystery of 1990 revealed

In 1989 and 1990 is the year of UFO (Unidentified Flying Object) in Belgium. At that time, a number of strange flying objects sightings were reported. On 29 November 1989, for example, a triangular UFO with bright lights underneath it reported a number of witnesses, including three police groups.
UFO reports were reinforced by some evidence of photographs and recordings. The best photo ever taken is a picture of a triangular UFO photographed in April 1990 an anonymous person. In the photograph depicted a triangular object with lights at each corner, one other light in the middle. Some people claim, it is important evidence of the existence of UFOs, others do not believe it and consider it as a hoax (hoax).
But nonetheless, the existence of the photograph keep scientists busy researching, what was it. No exception scientists leading the U.S. space agency (NASA). They are confused.
The photo was probably going to continue to be a mystery until now - after 21 years. Someone men admitted on RTL-TVI network. That he is the person responsible behind the incident was horrendous picture. And that UFOs are visible in the photo is a hoax.
He explains things in photographs made of polystyrene or similar foam that assembled in just a matter of hours. Then photographed at night.
The man, identified as Patrick was admitted, the prank he did at age 18. Together with some friends, he painted cork that had been strung, hung, and photographed. The work of idle they become the sharpest photograph owned scientists.
A few days after the photo was released, a Belgian Air Force plane was ordered to hunt UFOs across the country. But, no results. Some Belgian citizens believe in what they think the UFO is a new stealth aircraft being tested NATO.
"It's easy to fool people, even by way of capital and cheap," Patrick said, then added he argues, is the perfect time to uncover the secret.
Read More......

Pentagon new enemies

U.S. Deputy Defense Secretary, William Lynn, the Department of Defense issued a 24 000 files have been stolen hackers (hackers). Data retrieved through a computer network defense contracting company in cooperation with the Pentagon.
Lynn said the U.S. government has a "good idea" about who was responsible for this incident. In the past, such attacks are always blamed on China or Russia.
However, the Pentagon fears is, thieves this time a terrorist group that has the ability to steal data. At a speech at the National Defense University in Washington DC., Thursday, July 15, 2011, local time, Lynn said that the Pentagon has suffered cyber attacks, many foreign files stolen by hackers. About 24,000 files, stolen from a computer network defense industry in March. This is one of the biggest cyber attack in U.S. history.
This attack in a speech reported by Lynn about the new cyber-strategy, which formally declared the dimension of cyberspace as a new fighter, like air, land and sea. This speech called for the development of computer networks are more robust so that the military could operate if the system is essential to penetrate or be taken over.
With regard to the new dimension, at the beginning of this year U.S. President Barack Obama has also signed a decision regulating the extent to which military commanders can use cyber-attacks and other computer-based operations to attack the enemy.
As reported by The Telegraph, the Pentagon has long worried about vulnerability of computer systems. Concern is growing as the military becomes more dependent, not only on his own computer, but also on its contractors.
The attack on the Pentagon's contractor for example, occurs at Booz Allen Hamilton (BAH), a technology provider for the U.S. military, including cyber security for the military and intelligence.
Group of hackers managed to get tens of thousands of U.S. military email addresses of those companies that were then distributed on the internet and make it vulnerable to hacker attacks another.
According to The Telegraph, July 12, 2011, Anonymous hacker group, stole 90 000 email addresses and passwords from the network system BAH on Monday last week. A total of 53,000 of whom have a domain name. Mi meaning associated with the military.
It is feared that the leaked emails easily send the software breaker or destroyer of the network system. Besides email and password to steal data, delete the group Anonymous are also four gigabytes of data belongs to BAH. They call this attack "Liquefaction Military Monday". Anonymous groups say they can easily infiltrate into the tissue because the BAH a lousy security system.
***
Penetration of the Pentagon's computer systems in recent years the Department of Defense associated with the system's most sensitive technologies, including satellite reconnaissance and communications systems. Penetration into the target computer networks of military equipment including missile tracker system.
This is what is causing the Pentagon to assess that the hackers in cyberspace began to spread threats are no less fatal to the conventional enemies, like soldiers or tanks. "In the 21st century, bits and bytes can be as dangerous as bullets and bombs," said Lynn, as quoted by BBC news station.
He worried that the cyber attacks in the future not only focused steal data, but also undermine the U.S. defense, can even cause death. This is related to the efforts of hackers trying to break through the computer network to steal data missile technology and most advanced fighter aircraft.
Lynn then revealed that at least one fatal attack occurred in 2008. Hacked into secret computer systems the Pentagon, the attack was carried out by the secret intelligence service. "We know know who did it," Lynn said as quoted by the Associated Press.
He refused to call a foreign intelligence service in question. According to him, the stolen data is information that is "normal" look, such as spare parts spesifikiasi tanks, planes, submarines and American-made.
"But we are concerned about some of the most sensitive data, such as aircraft navigation systems, surveillance technology, satellite communications systems, and network security protocols," said Lynn.
Marine Gen. James Cartwright, Vice Chief of the U.S. Joint Armed Forces, judging that the mechanism has been applied to protect computer systems have been too predictable. In addition, there are no penalties for hackers who could give a deterrent effect. "The system is too defensive. We should think of a way to change it," said Cartwright.
He emphasized that the U.S. should focus more offensive in cyberspace. "For the Department of Defense, the network computer is actually a network of blood."
Last month, Defense Minister Leon Panetta stated, there is a strong tendency attack "Pearl Harbor" is the next-cyber attacks that hit the main U.S. force, financial systems and governance.
Read More......

Members of U.S. Congress mungundurkan himself because of sex scandal

U.S. lawmaker, David Wu, said he would resign following a sex scandal issue that happened to him. Wu is the third congress members who resigned due to scandal.

According to page Los Angeles Times, Tuesday, July 26, 2011, congressman from Oregon resigned after news broke of sexual relationship with a 18-year-old woman last year. This woman is the child of a close friend as well as donors to the campaign Wu.

Women who are unnamed, said his sexual relationship with Wu undesirable. Wu was charged with criminal because the victim was admitted to not having enough evidence to the police report filed.

However, the minority leader in congress, Nanci Pelosi, demanding an investigation into the code of conduct regarding this case. Wu finally chose retreat, for reasons of family honor.

"I can not take care of my family as I would like if a congressman while struggling with these serious allegations. The life of my children priority than others," said Democrat congressman from this.

Wu previously recorded ever take medication for psychiatric illness. He also stir the Congress by sending her picture wearing tiger costumes to its staff.

Unclear when Wu would actually resign. However, efforts for the seat after the death of Wu has already begun. Parliamentary elections will be held only when Wu retreat. Democrats believe they can win these seats.

Wu is the third congress members who resigned due to scandal. In June, Anthony Weiner of the Republican party down after pleading often send lewd pictures to a woman on the internet. Earlier in February, Christopher Lee, also from the Republican, resigned after an email seduction and a picture of him shirtless spread on the internet.
Read More......

Teens who cut off the head of U.S. Sentenced to 3 Years

A teenager in the United States was sentenced to prison for three years after being found guilty of killing four people in Mexico. The results of this investigation showed that teenagers working for drug cartels Levya Beltran brothers.
Quoted from page Daily Mail, Tuesday, July 26, 2011, teens 14 years old named Edgar Jimenez-Lugo kills its victims by chopping off their heads. His body was then hung from a bridge in Mexico.
Lugo who has the name of El Ponchis gangster or "closed" was arrested in December 2010 while waiting for the plane in Cuernavaca, Mexico, to Tijuana with his sister.
One 16-year-old sister who is also accused of involvement in criminal acts Lugo. This girl turned out to help rid the body of his brother slaughter on the highway, officials said. Meanwhile, the other sister Lugo was released because it is not implicated.
Lugo was sentenced to three years because that's the maximum penalty that may be given to minors. He was charged under a planned criminal acts, murder, kidnapping, and possession of weapons and drugs.
In a video taken by CNN in December last year, looks Lugo is being interrogated by the Mexican military. When asked about the number of victims who have been killed, the boy replied calmly.
"Four. I cut their throats. I did a four executions under the influence of drugs and under threat if I did not kill, I will kill them."
Many teens who use Mexican drug cartels against the government, but the story of El Ponchis is astounding. Lugo who lived with his brother in the slums of Cuernavaca began working for the Beltran Leyva at the age of 11 years.
Mexican newspaper La Razon reported last month that El Ponchis receive a fee of $ 3,000 (about Rp 25 million) for each murder.
Read More......

Tuesday, February 22, 2011

BUTIK AQILLA - Butik Baju Muslim dengan Koleksi Lengkap

Review saya kali ini adalah mengenai sebuah Butik Online dengan koleksi baju muslimnya.  Butik ini berdiri pada tanggal 1-1-11 alias 1 januari 2011 dengan memakai visi "menjadi yang terdepan dalam memberikan solusi berbusana yang sesuai dengan tuntunan Islam."  Butik ini memiliki banyak koleksi mulai dari jilbab, gamis, blus khusus Muslim, celana hingga aksesoris - aksesoris yang bisa dilekatkan dipakaian anda.

Kalau bicara tentang harga, pasti ini menjadi masalah teman teman semua..Harga di butik online ini tergolong dapat dijangkau oleh menengah kebawah...tetapi model model pakaian yang ditawarkan terkesan mewah loh..

Saat ini Butik Aqilla memberikan CASHBACK langsung sebesar 10% apabila teman melakukan pembayaran pada saat yang sama saat pemesanan.. Sangat menguntungkan anda bukan?  Buruan Belanja Baju Muslim anda sebelum kehabisan Read More......
loading...