Discussion about this post

User's avatar
Sam Morgan's avatar

Are you codifying the explore/expand/exploit process at all? Feels a bit random walk-y & could it be valuable if sequenced somehow?

Expand full comment
1 more comment...

No posts