During the month of September 2014 I experimented with a DIY version of soylent. I know that many people have started using the food substitute as a sole source of nutrition, but I wanted to foc......| fosterelli.co
Reinforcement learning agents are notoriously unstable to train compared to other types of machine learning algorithms. One of the ways that a reinforcement learning algorithm can underperform ......| fosterelli.co
A common analogy for explaining gradient descent goes like the following: a person is stuck in the mountains during heavy fog, and must navigate their way down. The natural way they will approac......| fosterelli.co
Cross-Site Request Forgery, or CSRF, is a type of attack that developers are familiar with in traditional web applications, but often misunderstand or forget about when it comes to new REST API’......| fosterelli.co
What is 6 / 2(1 + 2)? Thousands of twitter users can't seem to agree -- let's dig into why and what the real answer is.| fosterelli.co
This post breaks down how you can create windows of deep focus time while keeping up with all the key notifications you can't miss.| fosterelli.co
This post breaks down the cryptographic architecture of Apple and Google's new contact tracing protocol, and how it preserves your privacy.| fosterelli.co
The recent Zoom vulnerability is just one of many examples which show us that many developers do not understand how CORS works| fosterelli.co
A common misconception I’ve seen while talking to people in the node ecosystem is that a module’s “reach” is contained to the context it is used in. This is not the case. Every single module you......| fosterelli.co
TLDR; Don’t use the ‘docker’ group Docker, if you aren’t already familiar with it, is a lightweight runtime and packaging tool. It’s very similar to simply running a basic virtual machine, but ......| fosterelli.co