Monday, February 18, 2019

The Candles With Long Shadows Are Called Dojis

Candles

The absolute basics of price action, candles, can be a much bigger help tool than most new traders realise. Only from them, it should be possible to analyse any chart along with projections on the future movements based on the shape of the candles alone. There are many different alternatives to candles (bars, lines, Heikin Ashi) but because of the basic character of this chapter, we will be covering the most popular one. This is how a candle is built:

(The picture was taken from: http://www.wallstwise.com/Charting.htm)

The central part of the candle – the body – represents the opening and closure of the candle. The shadow (or wick) above and below it, shows how the price reached other levels before the candle’s closure. A candle is the representation of the time frame – on a 1-hour time frame, a candle will represent 1 hour, on a 1-day time frame, a candle will represent one day and so on. If the price closes higher than it opens the candle is green (on our charts, white) and if the opposite happens, it turns red (on our charts, black).

The structure of the candle can tell a lot about the current trend. A long body with dominance over wicks is an indicator of strength, while long shadows and short body suggest trend weakness or potential reversal. The candles with long shadows are called dojis.

Wednesday, January 30, 2019

how to publish your own bestselling ebook in 21 days or less without writingdan

how to publish your own bestselling ebook in 21 days or less without writingdan

Instant eBook Publishing!: How To Publish Your Own Best-Selling eBook In 21 Days Or Less Without Writing

Dan Lok

©2015 Dan Lok

Table of Contents

Special Unannounced Bonuses!

About The Author – Dan “The Man” Lok

INTRODUCTION

CHAPTER 1 - eBooks: The Fastest and Easiest Way to Make Big Money Online!

CHAPTER 2 - 5 Easy Steps for Picking a Best-Selling Topic

CHAPTER 3 - How to Get Other People to Write Your eBook For Free!

CHAPTER 4 - Jumping In Head First

CHAPTER 5 - How to Create an Offer That Nobody Will Turn Down!¬¬

CHAPTER 6 - How to Use Your Co-Author’s Resources to Make You Money!

CHAPTER 7 - Creating a Best-Seller Out of the Contributions

CHAPTER 8 - Creating a Million Dollar Business From Your First eBook!

CHAPTER 9 - Avoiding Potential Problems

CHAPTER 10 - Conclusion

Special Unannounced Bonuses!

Thank you for investing in this eBook.

I love to hear from my reader.

If my book has in any way helped you, then I am glad I wrote it.

Your feedback is important to me. I value and appreciate receiving your compliments or suggestions.

Please email your positive feedback to: feedback@danlok.com

When you get in touch with me, you’ll have instant access to 2 special bonus gifts that will help you implement the strategies in this ebook more effectively.

Thursday, January 24, 2019

presentation is usually done by leveraging visualizations and tables

The concepts of overfitting and underfitting would be explained further in the next chapter

The evaluation metric on the train and validation splits enable us to debug the model to discover whether it is underfitting or overfitting to the training set. If it is underfitting (not learning enough), we can increase the power of the model else we apply regularization if it is overfitting (learning noise). The concepts of overfitting and underfitting would be explained further in the next chapter.

Data Presentation

The last stage is all about presenting our findings in a form that is intuitive and understandable to non-technical professionals such as managers, marketers or business leaders. The importance of this step cannot be overemphasized as it is the crowning jewel of the data science process. Presentation is usually done by leveraging visualizations and tables. The purpose of this step is to communicate the insights discovered from the data science process in such a way that the information provided is actionable. This means data presentation should enable a decision making process. It should be clear from the presentation what steps need to be taken to solve the original problem which was posed as a question in the first step. It may also be desirable to automate the process as the insights produced may be so valuable that they need to be returned to regularly. Another possible outcome is bundling the model into a data product or application that is served to end users. To do this, the model would need to be optimized for production and deployed in a scalable fashion.

The Creator Can Decide Who Can Add Information Or See It

(The latter means that the user is anonymously active, but transactions could be calculated backwards to the end user; therefore, they are not 100% anonymous.)

The second possible type is a consortium blockchain, which only uses specific crossover points for validation. As a result of this only participants of the “consortium” have access to the blockchain, this guarantees a faster process, and the creators can decide if participants are public or anonymous. This form will be very interesting for business adaptions, which we will discuss and explain at a later point of this book in greater detail.

The third type is an entirely private blockchain; here transactions are validated by a certain amount of validators. The creator can decide who can add information or see it. This results in a very fast processing time, and the creator usually knows each validator.

You may question yourself, what is a blockchain or how can I imagine it. As the name suggests, the blockchain is a linkage of several blocks. The speciality is that each block is generating code, based on the content it carries, which is saved in the consecutive block with other new information. But let’s look at an example, which might be easier to understand:

I nearly fell out of my chair

Ive trouble doing this though. Perhaps Im just an impatient guy when it comes to police procedural shows but one episode on CSI came across as gut-wrenchingly sloppy. It showed a low-level programmer realigning a satellite from his laptop without any assistance from any other agency. I nearly fell out of my chair. It takes an insane amount of teamwork and coordination between other agencies to do something of that technical caliber.

Mobile phone tracing does require more resources than a landline since a cell phone number is not connected to a single switch. But it isnt impossible for a mobile phone provider to locate which towers the phone used or what region the call was made. One way of doing it is by comparing signal strength and then correlating that with the antenna that held your signal. If youve got an unencrypted non-burner phone, the GPS chip inside will give up your location to any who are in possession of it.

I bet youre wondering how come you cant trace a mobile phone like your cell phone company can.

The reason is the same reason that you cant identify individuals by IP address alone. Only the telephone company knows because they have the logs. They own the equipment. They have easy access. Even police need a subpoena to get subscriber access from a VPN, (or virtual private network). They cant hack the system for one individual without risking their job (or political career). Well, the NSA can I suppose, only thats a whole other enchilada. But for the internet itself no node within it is any more special than any of the others since it uses the same band.

Rdisplays The Route Table

The tracepath command will produce one line of output for each response it receives, unlike tracreoute which produces one line of output per hop. In the following example, youll see that two responses were received from 10.0.2.2.

$ tracepath -n google.com

1?: [LOCALHOST] pmtu 1500

1: 10.0.2.2 0.470ms

1: 10.0.2.2 0.649ms

2: 192.168.1.1 2.147ms asymm 64

...

For simple checks, tracepath can do the trick. For advanced options, youll probably end up using traceroute.

Network Statistics

The netstat command can be used to collect a wide variety of network information. Here are some of my favorite and most used netstat options.

-nDisplay numerical addresses and ports.

-iDisplays a list of network interfaces.

-rDisplays the route table. (netstat -rn)

-pDisplay the PID and program used.

-lDisplay listening sockets. (netstat -nlp)

-tLimit the output to TCP (netstat -ntlp)

-uLimit the output to UDP (netstat -nulp)

The -n option is used to display numerical IP addresses and ports as opposed to hostnames and service names. You can use this option in conjunction with most other netstat options.

Get a list of network interfaces on your system by using the -i option.

To display routing information, use -r. I often use netstat -rn to display the routes using IP addresses.

AFTER FEW SECONDS THE SNAPSHOT WILL BE CREATED

AFTER FEW SECONDS THE SNAPSHOT WILL BE CREATED

  1. During the installing SERVER2 virtual machine, make sure that you use the following settings and options:
  • Virtual machine name: SERVER2.
  • Operating system version: Windows Server 2016.
  • Memory: 1024 MB
  • Hard disk size: 50 GB
  • Network Adapter: VMnet2
  • Password: Password@123
  1. Once you installed the SERVER2 virtual machine with the preceding settings, configure the following TCP/IP settings:
  • IP address: 192.168.0.2
  • Subnet mask: 255.255.255.0
  • Default gateway: 192.168.0.1
  • Preferred DNS server: 10.0.0.100
  1. Once you configured the preceding TCP/IP settings, open the System Properties dialog box, set the computer name as SERVER2, and restart the SERVER2 virtual machine.
  2. Sign in to SERVER2 with the Administrator account.
  3. Shut down the SERVER2 virtual machine.
  4. Shut down the DC1 virtual machine.


Task 9: Creating Snapshots of Virtual Machines

Once you installed and configured all the virtual machines, you need to create the snapshots/checkpoints for each virtual machine. Snapshot will help you to revert a virtual machine to its previously used state (at the point when you had created it).

To create a snapshot, you need to perform the following tasks:

  1. Make sure that the all virtual machines are turned off.
  2. Select and right-click any virtual machine, select Snapshot, and then select Take snapshot. After few seconds, the snapshot will be created.
  3. Using the preceding method, create snapshots of all the virtual machines.