Showing posts with label Internet of Things. Show all posts
Showing posts with label Internet of Things. Show all posts

Sunday, September 18, 2016

Recommended Readings on Internet of Schools


The Trends and Challenges Shaping Technology Adoption In Schools


https://ww2.kqed.org/mindshift/2016/09/16/the-trends-and-challenges-shaping-technology-adoption-in-schools/



The Connections Between Computer Use and Learning Outcomes in Students

Saturday, September 17, 2016

Readings on sensors, smart cars and smart homes...

Of Smart Cars under IoT

What could Google have in common with Lexus, Toyota, SEAT, BMW and Audi ?
Car Think!



Under the Internet of Things, cars could think and react and prompt. They could be paired to an owner’s smartphone, home, lighting, heating and control systems. They would be connected to various house appliances. All settings could be adjusted from behind the wheel.

Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.

The car’s geo-location software would work in tandem with the home cameras and innumerable other sensors, so that the owner and his assets are well connected and the owner well informed of the position.

Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any  smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute. 

Cars would communicate with parking lots in its search for parking spaces. Apps are already available to reserve parking slots against due payment. Problems of finding cars in huge sized parking lots are facilitated on the smart phone. Town restraints on parking could be detected and the owner informed of risks. (Parking prohibited in Troy on Wednesdays, for example) 

Alerts on status of car machines would be available. Any problem in the car could be detected; if there is need to fill in fuel, air oil etc. the car would notify. Efficiency levels and maintenance costs are minimized owing to early warning suggestions.The smart car would have diagnostic systems which analyse generated data points to predict latent vehicle issues before they really result in a problem.

Security features that keep the car connected in an emergency. eCall-equipped chip by 2018 that will automatically contact the nearest emergency centre in case of a collision. Plain breakdown could be reported real-time to breakdown services.

Cars could capture conversations and respond (e.g: How far is the ATM?) 

Sensors would also monitor driver behaviour and warn them of sleepy eyes or over limit alcohol intake. Thus IoT enters the arena of behaviourial oversight for safety's sake. Family / Chauffeur trackers that would send reports if the driver has violated agreed upon boundaries

Sensors of the Smart type would advise on: 
  • Road topography and conditions
  • Fuel Stations and rest rooms
  • Proximate vehicle distance
  • Obstacles in rear, sides and front
  • Blind spot manoeuvring
  • Air pressures
  • Vehicle engine and engineering
  • Seatbelts
  • Weather ahead
  • All electronic controls
  • All crucial elements like gears, brakes etc
  • Traffic management
  • Food to suit tastes!
We may need drivers no more!!!

Some References



Extract from a forthcoming book by the author. 

Thursday, September 15, 2016

Securing the Internet of Things from terrorism

Terrorists use the internet on a 4 R frame - to relate to, recruit, retain, and refer their clandestine network. They use the net to build bonds and networks, and to maintain dangerous relationships. Given a common mission (to disrupt if not destroy the State), they meet and tie together in virtual space platform.  

How do the terrorists use the internet?
  • Selling a radical ideology - the web as a medium to propagate.
  • Eavesdrop to  enable recruiting followers with an extreme bend of mind.
  • Virtually communicate in forms which are accessible to password restricted followers but inaccessible to authorities.
  • Deepening relationships through instilling fear within and without and creating the obsession of goal achievement.
  • Building protected cyber-forums.
  • Instilling hatred for the system.
  • Provoking the mind of the potential recruit (may be through a photo, a story, a harping on a series of stories.  call to action).
  • Exaltation of terrorism to obsessive levels in the psyche of the potential terrorist.
  • ‘Fundamentalizing’ thought from a level of acceptance of the neighbour to a level of abhorrence. 
  • Arranging stealth finance. Payment systems are used: funds are moved through electronic wire transfers, credit card or alternate payment facilities.
  • Using avenues like crowd funding, e-commerce to solicit funds for the illegal activities.  

  
Criminal activity in finance would include
  • identity theft,
  • access to account database,
  • credit card theft,
  • wire fraud,
  • stock fraud,
  • intellectual property crimes,
  • auction fraud, 
  • e-gold online payment accounts  
  • using commodity markets


Case 1: Younis Tsouli  (2005) built websites and ran web forums for terrorists. He was a distributor of video material for terrorists. He hijacked web sites; ran password-protected forums with large number of members which were used for military instructions. Laundered money was used to fund the registration of nearly 180 websites as also to equip terrorists across several countries. Approximately 1,400 credit cards generated approximately £1.6 million of crime driven money.

Case 2: Tariq Al-Daour (2006)  had 37,000 credit card details on his computer drives. These were obtained through phishing attacks or purchased in on-line forums where stolen information circulates. Gullible people were led to believe that they were verifying their accounts were unwittingly helping the group fund their terrorist activities.

As terrorists connect through cyberspace, IoT raises security issues as never before. Given that the devices are all inter-connected, theft at any one point could have a contagion effect with the criminal having recourse to a huge set of data. Ranging from electronic key to mobiles to identity theft, there are multiple avenues but also immense potential for harm. IoT would enable availability of movements and preferences of consumers,Criminal hackers could track these through a host of inter-connected devices. The security threat implicit in multiple connected devices has to be instilled in the consumer mind-set. In the absence of any IoT regulator, self regulatory standards by independent vendor are essential.

References:-
http://techonomy.com/2016/08/27253/

(Excerpts from a forthcoming book by the author) 

Operational Risks of IoT - Cyber-attacks

A cyber-attack is a deliberate, planned criminal use of computer networks to launch an attack against the intended victim, entity, organization or country.  The machine led virtual attacks aim to disrupt or at least weaken the optimal functioning of target entities. This disruption would result in a slowing of or 'freeze state' in regard to  the computer infrastructure. 

The modus operandi could be hacking, social media interventions, computer viruses, malware, ransomware, phlooding (“Phlooding” refers to the aiming at freezing the central organizational servers through intended, deliberate overloading of the servers, which consequentially slows systems or stalls the systems) etc. Inevitably, there is a  service delay or denial to customers.   

Cyberattacks will instil fear of a different variety. The withdrawal of balances through ATM in remote places (as recently happened in India) is sufficient to cause panic in general public. Imagine then,  a series of crippling attacks as was seen in Israel in January 2012, involving the targeting of multiple representational Israeli websites.

Case 1 : In January 2012, hackers stuck at financial muscle of Tel Aviv - the Stock Exchange, and the First International Bank. There was a DOS attack. – denial of service. The disclosure of the credit card and account details of thousands of Israeli nationals - Banking Supervision Department of Bank of Israel said 15000 accounts were broken  into - unnerved public at large. The e-attacker, OxOmar and sometime earlier, the Gaza Hackers Team which had usurped Israeli fire services website,  had indicated the operational risks in using internet.

Case 2 - One of the big US  banks went public in 2014 that it systems had been susceptible. Data of seventy six million household customers and seven million businesses, had been reportedly run over. Their names, email addresses and telephone numbers were in the hands of intruders.

The cyber-attackers are obsessed with religious, political or social objectives. They will continue to orchestrate run on the systems without any fear of the future. Any country can be attacked any time,  anywhere.   

As IoT evolves and seeks to put in place an elaborate pattern of connected systems, contagion risk is very high. We need to erect moats to safeguard the fort of Internet of Things.

References:
http://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/
http://www.bbc.com/news/world-16577184 
http://www.timesofisrael.com/israelis-in--hack-case-to-be-extradited-to-us/

(Excerpts from a forthcoming book by the author) 

Further Readings: Internet of Things

Wednesday, September 14, 2016

The Internet of Insecurity- Fear as the Key.

Watch Your Wearable 
In the world of internet of things, (IoT) inter-connected smart household devices would have / abet surveillance capabilities. This could intrude privacy. These inter-connected devices are  vulnerable to hacking. 

  • As IoT knits together automobiles, electricity, air-conditioners, dishwashers, refrigerators, alarm systems etc., their security features could be broken into by a determined impostor or a group of criminal 'infiltrators'.
  • Hackers could access networks through pilfered user authorisations. Stealing identification, tracking down locations of a community of individuals etc. would be possible.
  • Hackers could intercept / read/ analyse signals emanating from the newly networked devices, Hardware could be easily penetrated and web connected machines stand exposed.   
  • Political strategy to accentuate the division of sects  has technological repercussions. The  fragmented groups  may have opened a new war zones with web warfare. As they become fragmented, it becomes difficult to track. 

Evolving threats identified by establishment agencies all around are:

  1. Individual criminals;
  2. Extremist Groups like the Islamic State using online hacking as a weapon ;
  3. Clandestine, detached groups using them;
  4. Online hacking - breakdown threats to www; 
  5. Using social media to eavesdrop/ influence; 
  6. Money laundering using internet fund transfer;
  7. Financing of disruptive terrorist activities using systems;
  8. Potentially ne'er-do-well states using them in frustration ;
  9. Power seeker nations seeking to destroy competitor's systems T

These 'infiltrators' could indulge in:
  • spying, 
  • deliberate placement of disinformation, 
  • theft of identity and data, 
  • open and subtle propaganda of their belief systems 
  • stealth attacks on data in singular or multiple patterns.  

Together, these negative approaches have immense destruction capabilities. The future of online security lies in the ability to proactively stall potential criminals through offensive and defensive mechanisms.  With authorities in the US suggesting that Russia and China may have more sophisticated cyber programmes, an on line warfare seems to be in the offing to substitute the cold war era.  

These 'infiltrators' could easily listen into or tap the millions of signals which would follow the internet of things. 

The Age of Insecurity is here.

Excerpts from a forthcoming book by the author

Friday, September 2, 2016

Case Study of a Smart Campus project (The Indian Institute of Science- IISc)

The Indian Institute of Science is developing an open, integrated and extensible Internet of Things (IoT) technology stack for Smart Management of campus utilities.

The IoT stack brings together:
hybrid sensing with physical and crowd-sourced sensors,
diverse networking technologies,
Big Data Analytics platforms,
Sensor driven utility management.

The project is  a "laboratory" to test and validate IoT research and technologies for India.

About 30 buildings on campus fitted with IoT networking and water sensors.Intelligent water management to take over for a sustainable campus environment.This will document water arrangements,   patterns in buildings and labsReduce wastage due to leakages (“drips”)Ensure quality & maintenance of waterMonitor quality of water on tanks and outletsAlert users on potential quality issuesCrowdsource to report maintenance issues 

IoT connects large numbers of sensors through the Internet
Allows sensing and data collection in real-time
Creates a feed-back loop,

IoT stack contains:
Sensors: Physical and Crowd-sourced sensors using Android App
Wireless Network: On the field to connect sensors with IISc LAN
Big Data Platform: Collect, store & analyse large data in real-time
Analytics: Algorithms for smart management decisions  

IoT applications are data intensive. 

Big Data platforms support such applications
Data arrives at high velocity from sensors
Applications obtain large volumes over time
Apache Storm ensures fast data processing
Hadoop/HBase for large data storage & query
Intelligent use of Edge Devices & Clouds
Reduce B/W, Improve privacy.

Source http://smartx.cds.iisc.ac.in/
(Stack refers to the layers (TCP, IP, and sometimes others) through which all data passes at both client and server ends of a data exchange. TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet.)
(Apache Storm is a free and open source distributed realtime computation system. Storm makes it easy to reliably process unbounded streams of data, doing for realtime processing )
(Data ingestion is bringing data into your system, so the system can start acting upon it.)

Thursday, September 1, 2016

Smart Campus within a Smart City

“A Smart Campus” could be envisaged as a community of technologically interconnected academics and students within a Smart City. To launch a Smart Campus, one would need to identify specialized technical and non-technical skills available on a real time basis.

How would Smart Campus help?
  1. Higher education researchers, educators, and students are in a vantage position to lead in inventing, innovating, discovering and developing IoT devices, applications, systems, and services.
  2. It (Smart Campus) would lay the foundation for adding thrust to connectivity within the Smart City linking unconnected/non- networked points.
  3. It should give an impetus to innovation – be the intellectual innovation lab of the Smart City.
  4. It could evolve digitalized trading platforms (electronic bourses) so that trading at cheaper prices is feasible.
  5. It could experiment in security intended monitoring and surveillance.
  6. It could help erect/ commission smart buildings (energy efficient, ecologically sustainable, cost affordable).
  7. It could use analytics to predictively mine Big data. The use of predictive analytics in learning would help dynamic behavioural pattern identification and help appreciate how students learn and respond to different types and levels of interventions.  This could be extended to all city residents eventually.  
  8. Could be into operations' research on operational cost reduction and enhanced productivity. Potential cost savings include the areas of smart lighting, smart waste management, smart traffic signalling, smart parking, smart building optimisation.
  9. Technology’s capacity to drive a better experience and outcome for students. The transmission of information flow would be dynamic, with real time assimilation of data flows with contacts between mobile and stationary elements and mobile to mobile elements. Elements.
  10. The new Smart Campuses should fructify private-public partnerships.
Examples
  1. At Virginia Tech, the  VT Alerts  system notifies students, staff, and faculty of a campus emergency situation. Smart campuses could use smartphones and wearables like students'  smartwatches etc. as a connectable communications mechanism.
  2. The University of Washington, a student-developed app— OneBusAway—provides real-time information for metro-area bus systems.
  3. University of Wisconsin:  Students create IoT apps end-to-end systems from devices speaking with other local devices such as in a smart home, communicating over a network to centralized management systems and to applications in the cloud. The UW-Madison IoT lab helps evolve new business models innovations, using IoT-enabled systems. This creates new services and integrate and analyses data from systems to increase  add value to businesses and consumers. The University has a multidisciplinary approach.


References:
1   SmartCampus: A user-centric testbed for Internet of Things experimentation Michele Nati, Alexander Gluhak, Hamidreza Abangar and William Headley Centre for Communication Systems Research University of Surrey
2  Internet of Everything – Powering the Smart Campus & the Smart City Geelong’s Transformation to a Smart City, Report by Brad Davies, dandolo partners
3   The Internet of Things is Here by Florence D Hudson 

Tuesday, August 23, 2016

Visualizing Internet of Things in Education:Autumn for Extant Teachers ?


  • Student Centric Learning Management Systems will rule the realm of Internet of Things.  Students will learn with greater autonomy and will be on their own rather than be spoon fed. 
  • Learning process would be driven by dashboard reflexes. Students would have access through a dashboard to all data that affect them.  
  • Teachers will have a dashboard too. Manuals for teachers will set limits for dashboard usage; the role of on campus teacher will shrink. 
  • Data from all connected IoT devices, including EI sensors, and student wearables will facilitate student technology solutions. 
  • Skilled technological staff will extract, develop and provide solutions. Data analytics department will emerge as most important support service.
  • The solutions will be useful to management of students even when they are off campus. There will be enhanced use of mobile technologies. Academic management, study process management and support services will be digitized and integrated. 
  • Students will be reassured with 24/7 sensor driven personal attention.
  • Applications will be developed to meet student needs ranging from knowledge doubts to mood swings to anxiety attacks. Apps might make learning game oriented.  They will offer personalized strategies to combat absorption apprehensions in students’ minds.
  • Skill shortage of technology support providers will hit hard. There will be an influx of technology professionals in to the education industry. 
  • Departments like language will 'wither away' to computer based learning. Extant language teachers may have to re-skill  or exit. Skills gap will  impact edu-thinking. As the industry transforms, EIs will realize they do  not really have all the data and analytics skills that are required.  
  • Information would have a micro and a micro dimension. At the micro level it is each student and teacher; at macro level it will be aggregated data watched keenly for trends. 
  • Armed with sets of voluminous data and analytics, research will emerge as more important than teaching. 


Monday, August 22, 2016

Internet of Things and Students


Sharing an informative article for school stakeholders from Tamara Chuang of the denverpost.com

Back to school with gadgets and other handy Internet of Things
http://www.denverpost.com/2016/08/22/back-to-school-technology-gadgets/

The Internet of Things: A teacher as a Displaced Person


A teacher could be a 'displaced person' (DP)  under the internet of things as he / she is incompatible with the new connected system.
  1.  Customization incompatibility: Students need no face to face contact hours as students can tap online resources at their convenience. Computers do not ridicule, defer, or hurt. 
  2. Time incompatibility: In IoT, the sensors will alert systems on any deviation from parameter. The system will have predictive abilities to suggest solutions in real time. Teachers cannot match such reflexes.  
  3.  Cost incompatibility: Costs are saved by IoT platforms. Brick and mortar and human elements are relegated to robotic response systems as they have high marginal costs. In IoT, fixed investments are already made and capacity utilization brings down costs-  with every additional learner costs are spread.
  4.  Memory incompatibility: A teacher cannot remember all the things that a robotic system can. In volume and content, the teacher is no match.
  5. Analytical Incompatibility: Systems will analyse student records and initiate prompt corrective action.  The machines will be granular even as it is analytical using the Big Data it has at its command.
  6. Perspective Incompatibility: The teacher cannot compete with the macro approach that is feasible.Subjectivity is reduced. They are subjective and oft carried away. Machines are impersonally efficient. 
  7. Approach Incompatibility: Teachers use a broad brush approach which will be seen as a non – specialism, non- student centric. In the IoT approach, machines take over monitoring. approach. Continuous learning is possible. 
  8. Record Keeping incompatibility. Electronic Student Records (ESR) will make it possible to react to data in rapid response system rendered feasible.  
  9. Privacy incompatibility: Anonymity of internet should help the backward student raise queries and seek responses from the system and participants.
  10. Technology Skill incompatibility. Teachers cannot acquire the technological skills needed to be in world of IoT in a short period. Students are more tech savvy than the average teacher. 


Saturday, August 20, 2016

How Internet of Things ought to Change Education

  • A strong connectivity infrastructure and security system to be in place. 
  • System must connect and track all devices within the school premises.
  • Inter-operability of devices within the school to be assured.
  • Upkeep of school computer hardware must be for predictive purposes.
  • Wearables on students to be monitored for academic improvement (wearables are to be with mutual agreement)
  • To use sensory devices on students for effective oversight over studies; teachers can respond to anxiety attacks in students immediately.
  • Access sensory information to be on real time basis.   
  • Big Data to be used to predict, improve student needs.
  • To monitor security of academic records.
  • Follow up of on line / mobile education.
  • Set up a reliable local area network (LAN) connection.
  • (A virtual private network (VPN) may be an option)
  • Transitions between different networks must be carefully crafted to avoid data loss if and when device connections fail.
  • Sensitive student data to be transmitted securely between devices.
  • Ensure that data is properly encrypted.
  • Multi-tiered authentication strategy to access data.
  • Have safe controls on access.
  • Assign zones of safety significance for security purposes.
  • Secure texting.
  • A centralized log-in procedure for network-connected devices.

Friday, August 19, 2016

The internet angst of the teacher

As technology evolves to the internet of things, human intervention might take a back seat. Depersonalized, customized, quality standardized, education of a higher order would be the norm. Class rooms may turn obsolete  or would be used occasionally just to assure a minimum number of face to face contact hours.
Big data and connectivity and sensors will drive the world.
The role of the teacher will shrink.
Students may welcome reduced lecturer roles as mobile applications or computer screens will not express displeasure of an annoying kind. Students can time and choose interventions of a studying kind at their will and pleasure.
Lecturers in all fields have to be computer engineers to some degree. Teachers who are not technologically proficient will be displaced persons. They have to be tech savvy to survive.
Quality manuals in education have to be technology based. The system must respond efficiently and promptly and without emotions.
Less of teachers, more of infrastructure. 

Monday, August 15, 2016

Building Teacher Skills in Emerging Economies-1

There is a worrisome perception among parents and other stakeholders about the declining quality of school education in emerging economies.  This is attributable to numerous factors but the more serious among faculty is a lack of adequate and contemporary post-entry training or continuous professional updating  for teachers.

Poor quality of  teachers means children are provided with weak inputs. Student learning is sub-optimal. Teachers may have the basic skills, but not much more. The cost of this failure to meet student needs on monetary and development and psychological angles could be substantial.  Thus investing in teachers'human resource development is the single most important challenge. 

There is a learning crisis at hand unless the teachers are adequately trained. There is need for focused attention on updating professional competences through technological intervention among teachers so that quality delivery of education is possible. 

Steps may include:

  • Establish an IT based information system  to inventory skills of teachers. 
  • Estimate demand and supply of skilled workforce in relation to education needs at a macro level and at the granular level.    
  • Match supply with demand at granular level. Identify deficits and work towards rebuilding teacher competences. 
  • Leverage modern technology to ensure  reaching out to teachers, particularly those needing scaling up in course content. 
  • Technology to be leveraged for designing  and developing tech driven pedagogical techniques.
  • An open platform for e-content on skill development of teachers to be aimed at. 
  • Crowd source content for this platform from among the practitioners and experienced to keep costs low. Affordability has to be ensured. 
  • High quality content aggregation by an expert team essential prior to release of content. 
  • Teachers must utilize the contents of this platform through Massive Open Online Courses (MOOC) and virtual classrooms . 
  • Have teacher innovation hubs at  regional and administrative unit levels. Learning has to be simultaneously decentralized. 
  • The Internet of Things (IoT)—the networked connection of people, process, data, and things—must be exploited to become the Internet of Learning Things
  • The target should be improvements in infrastructure / device availability which make  24/7 connectivity possible  for teachers to benefit and for the teachers to use techniques ranging from Cloud Computing to Big Data integration with the IoT 
  • Ease of delivering content to be ensured. 



Note: This is the first of a series on Teacher Skill Building in Emerging Economies by the author. 




How will Big Data help educational institutions?

  • Students’ voluminous data are easily captured in all its volumes on an ongoing basis.
  •  Data can be studied for the shortest time frame. Even intra-day analysis is possible. This shortens time to action. Prompt, proactive action is possible.  
  • Study patterns of students can be documented and examined on a historic basis.
  •  Predicting Student Performance. Rating them - Which students are slow in tasks assigned? Who are low performers and least performers?
  • Drawing up a Risk Matrix for Cohorts.
  • LP (Low Performing) student needing help some online help or offsite. 
  • A student in classroom session or on online learning:  Is there disinterestedness, boredom visible?  Is there frustration creeping in?
  • How often and in what manner do students use educational software? (Blackboard, EBSCO, Turn-it-in, any internal intranet?) When do they really submit; the pattern of submissions.
  • What is the inventory of faculty skills?
  • Predicting student progression. 
  • What courses and pedagogical modes attract students?
  • Which courses and pedagogical modes deter students?
  • Patterns in enrollment.
  • Deciphering patterns in student progression.
  • Analysis of student dropout ratios and causative factors.
  • Student retention trends.  
  • Predictive models using this type of unconventional data to assess teaching risk. 
  • Knowing and monitoring the opinion and attitude of the students and stakeholders as opinions, feelings and attitudes about the EI, as discussed on the world wide web.
  • Developing a sentiment analysis tool to monitor student reflections.
  • Monitoring social platforms and social media websites. Reconnaissance of the social sphere, including social networks, blogs, Facebook and twitter and other relevant sites.  
  •  Leveraging on valuable feedback and insights to improve offerings and services.
  • Student profiling to suit personalization.
  • Data would reveal the student interests.
  • Using student data for cluster analysis
  • Student’s propensity towards a certain subject can be measured.
  • Data from online usage- from cookies, URL and software metrics – could to identify which online channels the students are using and what they are using them for.  

Tuesday, July 21, 2015

Pangs of restructuring in the IT industry?

"Microsoft :  $3.2 billion quarterly net loss. "

IBM "revenues dropped for the 13th consecutive quarter and fell short of analyst expectations."  

United Technologies: "cutting its full-year profit outlook for the third time this year."

(From Various Reuters Reports)

Is it that the tech companies are experiencing a slow down as an aftermath of global slowdown?
Are technology companies undergoing the throes of disruptive power?
Are we seeing a withering away of technological centricity- of tech concentric power?
Are the old 'too big to fail companies'(TBTF)  companies  (IBM, Microsoft) set for struggle or lost in the woods of Internet of Things?
Is the IoT driving towards a restructuring of  the internet industry?

What is worrying for the real world industry is that technology, which is what drives productivity is lagging behind. If tech companies are under spells of non performance, real companies taht depend on technology for their throughput cannot be far behind.

Technological innovation must be most focused on the Internet of Industrial Things to keep the growth momentum. 


A worrying day for growth optimists. 

Note: This blog offers no investment advice. The views expressed here are without any risk or responsibility.