Hacker News new | past | comments | ask | show | jobs | submit | Maxious's comments login

There's some movement on https://github.com/modelcontextprotocol/registry

> The MCP Registry service provides a centralized repository for MCP server entries. It allows discovery and management of various MCP implementations with their associated metadata, configurations, and capabilities.


@ VS Code we've been collaborating on this and plan to ship initial support for registries in our next release.

Ollama is YC21 https://www.ycombinator.com/companies/ollama and was founded by the engineers of what became Docker Desktop

You know, the tool that very famously had a massive rug pull once it gained marketshare https://www.servethehome.com/docker-abruptly-starts-charging...


> First here, we understand that Docker needs to generate revenue. Creating a foundational technology and not having revenue to grow the business is hard. At the same time, the notice period is what one may consider short.

If the money was starting to run dry, with everyone using the tech (and Docker Hub in particular) but not really giving them any money for it, then something was bound to change.

It's cool that there are other alternatives to Docker Hub though and projects like Podman. I feel like with a bigger grace period, the Docker pricing changes wouldn't have been a big deal.


There's also some interpersonal conflict in llama.cpp that's hampering other bug fixes https://github.com/ikawrakow/ik_llama.cpp/pull/400

What the hell is going on there? It’s utterly bizarre to see devs discussing granting each other licences to work on the same code for an open source project. How on earth did they end up there?

There seems to be some bad blood between ikawrakow and ggerganov: https://github.com/ikawrakow/ik_llama.cpp/discussions/316

But he's talking about a MIT License!

WTF


My guess is that there's money involved. Maybe a spat between an ex-employee and their ex-employer?


Playing devil's advocate, could it be that they require a temporary access to a customized Windows driver (and thus they fake a trusted root certificate) to make Ventoy work? If that's the case, they should have documented it properly in the source...

Or do you think it's 100% malicious?


This year old issue regarding blobs in the repo with a ton of replies has not gotten responses from the author https://github.com/ventoy/Ventoy/issues/2795

Doesn't mean for sure it's malicious but them not even explaining why there's blobs like this is very suspicious.


I think regardless of intent, it is a security vulnerability to install these ring 0 loopholes. Microsoft is cracking down on RGB lighting and anticheat software drivers similarly


> prima.cpp is a distributed implementation of llama.cpp that lets you run 70B-level LLMs on your everyday devices— laptops, desktops, phones, and tablets (GPU or no GPU, it’s all good). With it, you can run QwQ-32B, Qwen 2.5-72B, Llama 3-70B, or DeepSeek R1 70B right from your local home cluster!

https://github.com/Lizonghang/prima.cpp



Have you seen https://github.com/mit-han-lab/nunchaku for running flux on lower VRAM and thus faster performance?

I have put up a PR https://github.com/ZiYang-xie/WorldGen/pull/7



The judges impeding ICE scenarios has been portrayed on fictional TV too https://thegoodwife.fandom.com/wiki/Day_485


You don't think Big Balls can order a drone on amazon? He was already fired once for intimidating rival companies online https://newrepublic.com/post/191325/elon-musk-doge-teen-cori...


I'm not sure what you're referring to; that article says he leaked internal information to a competitor.

That's not ethically excusable, but it's worlds apart from the kind of very real-world felonies involved in this kind of intimidation.

This kind of intimidation would be an incredible and extremely stupid escalation that carries the potential for decades in federal prison, and for what? DOGE has the ruling party and the full force of the executive branch backing their actions. They have no need whatsoever to engage in behavior so ridiculous and counterproductive.

To be clear, this would have required stalking the whistleblower at and around his home, in person. It would have required creating significant physical evidence that could trivially lead back to the perpetrator. There will be cell phone location records, security camera footage, printer microdots, camera lens/sensor fingerprints.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: