Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What they’re recreating is the evidence that some of the techniques work. But they’re starting with R1 as the input into those steps, not starting from scratch. I don’t think their work includes creating a base model.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: