Pseudo Securities For
Technical Analysts - Part 2
Last time, we examined the idea of using pseudo securities,
based on artificial data with known properties, to map the
characteristics of various indicators. We then applied this
concept to the time domain of security analysis. In this, the
second of a three-part series, we explore the actual technique
used to generate pseudo security data.
When working with pseudo securities,
as with anything else new
on the computer, it is generally
common sense not to experiment
within your working application.
For ProTA, BeeSoft’s
technical analysis software for
the Macintosh, I suggest that
you set up a second, dedicated
copy of your technical analysis
application with your preferences
and settings, but with initially empty ticker files.
Working in this resulting smaller file ensures that your
experiments won’t disturb your normal settings and preferences,
nor your ability to do your daily work.