frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Supermemo – a single stream for notes with chat-style retrieval

https://www.supermemo.me/
1•akrs•38s ago•0 comments

Natural Language Processing Template Engine

https://pythonforprediction.wordpress.com/2026/02/21/nlptemplateengine-vignette/
1•librasteve•1m ago•0 comments

OpenBrowser-AI MCP

https://openbrowser.me
1•billy-enrizky-1•1m ago•1 comments

An 8B parameter LLM trained on the Epstein files

https://www.neuroengine.ai/Neuroengine-MechaEpstein
1•thinkingaboutit•2m ago•0 comments

Thermal drone footage shows Musk's AI power plant flouting clean air regs

https://floodlightnews.org/thermal-drone-footage-musk-ai-plant-epa-rules/
4•devonnull•3m ago•0 comments

California tried to protect students' data. Tech companies found loopholes

https://themarkup.org/artificial-intelligence/2026/02/21/california-tried-to-protect-students-dat...
5•billybuckwheat•7m ago•0 comments

Show HN: I scanned 50k radio streams and built an app for the ones that work

https://github.com/meehow/receiver
1•meehow•8m ago•0 comments

A new guide/blog for those ramping up on agentic coding

https://contalign.jefflunt.com/introduction/
1•normalocity•9m ago•0 comments

Show HN: Gdansk – Generate React front ends for Python MCP servers

https://github.com/mplemay/gdansk
1•mplemay97•10m ago•0 comments

Reasoning Models Fabricate 75% of Their Explanations (ArXiv:2505.05410)

https://ai.gopubby.com/75-percent-ai-reasoning-fiction-lies-longer-than-truth-a36142dea7f8
3•Aedelon•12m ago•0 comments

Shifting from Deterministic to Probabilistic Software – Are We Uncomfortable?

https://medium.com/@ggonweb/shifting-from-deterministic-to-probabilistic-software-are-we-uncomfor...
1•ggonweb•12m ago•0 comments

Bad Grades

https://localthunk.com/blog/bad-grades
1•avocadosword•13m ago•0 comments

Gamepad Controls Elden Ring Streamer IRL Using a Wild Balance Hack

https://kotaku.com/perri-karyal-galvanic-vestibular-stimulation-elden-ring-2000668749
2•PaulHoule•14m ago•0 comments

Show HN: Nexus – A social platform where your GitHub profile is your identity

https://nexus-fqt4.onrender.com
1•tita-n•14m ago•0 comments

Show HN: Llama 3.1 70B on a single RTX 3090 via NVMe-to-GPU bypassing the CPU

https://github.com/xaskasdf/ntransformer
2•xaskasdf•15m ago•0 comments

Anki-CLI

https://github.com/ubermenchh/anki-cli
1•ubermenchh•16m ago•0 comments

We estimate that Claude Opus 4.6 has a 50%-time-horizon of around 14.5 hours

https://twitter.com/METR_Evals/status/2024923422867030027
2•doener•17m ago•0 comments

Online Pebble Development

https://cloudpebble.repebble.com/
2•teekert•22m ago•0 comments

Laser writing in glass for dense, fast and efficient archival data storage

https://www.nature.com/articles/s41586-025-10042-w
2•macleginn•23m ago•0 comments

I got annoyed by Claude Code's history, so I built a search CLI

https://github.com/madzarm/ccsearch
2•madzarm•23m ago•2 comments

India Open Network for Digital Commerce

https://www.ondc.org/
1•kaladin-jasnah•24m ago•0 comments

Grove: Detect worktree conflicts at write time to scale parallel agents

https://github.com/NathanDrake2406/grove
2•nathan9999•27m ago•1 comments

Why optimizing AUC may be insufficient for clinical deterioration systems

1•ameenfayed•28m ago•0 comments

Fury over Discord's age checks explodes after shady Persona test in UK

https://arstechnica.com/tech-policy/2026/02/discord-and-persona-end-partnership-after-shady-uk-ag...
4•duxup•29m ago•0 comments

Visualize Your Turborepo Workspace

https://turbograph.dev/
1•kuzeykose•31m ago•0 comments

Shai-Hulud-Style NPM Worm Hijacks CI Workflows and Poisons AI Toolchains

https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning
4•jicea•32m ago•0 comments

Show HN: Formally Verified a Millennium Prize Problem in Coq Yang-Mills Mass Gap

https://github.com/Shariq81/yang-mills-mass-gap
2•shariq81•32m ago•0 comments

Trump says he'll raise tariffs to 15 percent after Supreme Court ruling

https://apnews.com/article/trump-tariff-truth-social-872c8f04112a8991d8aa6ae5005767b6
4•_rend•34m ago•5 comments

Apple's Ferret AI model is a step towards Siri seeing and controlling apps

https://appleinsider.com/articles/26/02/21/apples-latest-ferret-ai-model-is-a-step-towards-siri-s...
2•geox•34m ago•0 comments

ClipSafe

https://clipsafe.app/blog/rss.xml
1•mcunderground•35m ago•1 comments
Open in hackernews

Cloudflare outage on February 20, 2026

https://blog.cloudflare.com/cloudflare-outage-february-20-2026/
98•nomaxx117•2h ago

Comments

boarush•1h ago
While neither am I nor the company I work for directly impacted by this outage, I wonder how long can Cloudflare take these hits and keep apologizing for it. Truly appreciate them being transparent about it, but businesses care more about SLAs and uptime than the incident report.
llama052•1h ago
I’ll take clarity and actual RCAs than Microsoft’s approach of not notifying customers and keeping their status page green until enough people notice.

One thing I do appreciate about cloudflare is their actual use of their status page. That’s not to say these outages are okay. They aren’t. However I’m pretty confident in saying that a lot of providers would have a big paper trail of outages if they were more honest to the same degree or more so than cloudflare. At least from what I’ve noticed, especially this year.

boarush•1h ago
Azure straight up refuses to show me if there's even an incident even if I can literally not access shit.

But last few months has been quite rough for Cloudflare, and a few outages on their Workers platform that didn't quite make the headlines too. Can't wait for Code Orange to get to production.

jacquesm•1h ago
Bluntly: they expended that credit a while ago. Those that can will move on. Those that can't have a real problem.

As for your last sentence:

Businesses really do care about the incident reports because they give good insight into whether they can trust the company going forward. Full transparency and a clear path to non-repetition due to process or software changes are called for. You be the judge of whether or not you think that standard has been met.

boarush•1h ago
I might be looking at it differently, but aren't decisions over a certain provider of service being made by the management. Incident reports don't ever reach there in my experience.
samrus•23m ago
In my experience, the gist of it does reach management when its an existing vendor. Especially if management is tech literate

Becuase management wants to know why the graphs all went to zero, and the engineers have nothing else to do but relay the incident report.

This builds a perception for management of the vendor, and if the perception is that the vendor doesnt tell them shit or doesnt even seem to know theres an outage, then management can decide to shift vendors

CommonGuy•1h ago
Insufficient mock data in the staging environment? Like no BYOIP prefixes at all? Since even one prefix should have shown that it would be deleted by that subtask...

From all the recent outages, it sounds like Cloudflare is barely tested at all. Maybe they have lots of unit tests etc, but they do not seem to test their whole system... I get that their whole setup is vast, but even testing that subtask manually would have surfaced the bug

asciii•1h ago
It was also merged 15 days prior to production release...however, you're spot on with the empty test. That's a basic scenario that if it returned all...is like oh no.
dabinat•1h ago
I think Cloudflare does not sufficiently test lesser-used options. I lurk in the R2 Discord and a lot of users seem to have problems with custom domains.
martinald•37m ago
Just crazy. Why does a staging environment matter? They should be running some integration tests against eg an in memory database for these kinds of tasks surely?
atty•1h ago
I do not work in the space at all, but it seems like Cloudflare has been having more network disruptions lately than they used to. To anyone who deals with this sort of thing, is that just recency bias?
Icathian•1h ago
It is not. They went about 5 years without one of these, and had a handful over the last 6 months. They're really going to need to figure out what's going wrong and clean up shop.
NinjaTrance•1h ago
Engineers have been vibe coding a lot recently...
jsheard•1h ago
The featured blog post where one of their senior engineering PMs presented an allegedly "production grade" Matrix implementation, in which authentication was stubbed out as a TODO, says it all really. I'm glad a quarter of the internet is in such responsible hands.
dana321•1h ago
Thats a classic claude move, even the new sonnet 4.6 still does this.
bonesss•1h ago
It’s almost as classic as just short circuiting tests in lightly obfuscated ways.

I could be quite the kernel developer if making the test green was the only criteria.

blibble•54m ago
there was also a post here where an engineer was parading around a vibe-coded oauth library he'd made as a demonstration of how great LLMs were

at which point the CVEs started to fly in

gtowey•18m ago
It's spreading and only going to get worse.

Management thinks AI tools should make everyone 10x as productive, so they're all trying to run lean teams and load up the remaining engineers with all the work. This will end about as well as the great offshoring of the early 2000s.

dakiol•1h ago
No joke. In my company we "sabotaged" the AI initiative led by the CTO. We used LLMs to deliver features as requested by the CTO, but we introduced a couple of bugs here and there (intentionally). As a result, the quarter ended up with more time allocated to fix bugs and tons of customer claims. The CTO is now undoing his initiative. We all have now some time more to keep our jobs.
logicchains•50m ago
That's not "sabotaged", that's sabotaged, if you intentionally introduced the bugs. Be very careful admitting something like that publicly unless you're absolutely completely sure nobody could map your HN username to your real identity.
samrus•31m ago
Thats actively malicious. I understand not going out of your way to catch the LLMs' bugs so as to show the folly of the initiative, but actively sabotaging it is legitimately dangerous behavior. Its acting in bad faith. And i say this as someone who would mostly oppose such an initiative myself

I would go so far as to say that you shouldnt be employed in the industry. Malicious actors like you will contribute to an erosion of trust thatll make everything worse

sp00chy•19m ago
Might be but sometimes you don’t have another choice when employers are enforcing AIs which have no „feeling“ for context of all business processes involved created by human workers in the years before. Those who spent a lot of love and energy for them mostly. And who are now forced to work against an inferior but overpowered workforce.

Don’t stop sabotaging AI efforts.

hypeatei•25m ago
That's extremely unethical. You're being paid to do something and you deliberately broke it which not only cost your employer additional time and money, but it also cost your customers time and money. If I were you, I'd probably just quit and find another profession.
renegade-otter•16m ago
I see someone is not familiar with the joys of the current job market.
Ylpertnodi•54m ago
Typo: "shop", should have been with an 'el'.

(: phonetically, because 'l's are hard to read.

Betelbuddy•1h ago
Cloudflare Outages are as predictable, as the Sun coming up tomorrow. Its their engineering culture.

https://hn.algolia.com/?dateRange=all&page=0&prefix=false&qu...

lysace•1h ago
It has been roughly speaking five and a half years since the IPO. The original CTO (John Graham-Cumming) left about a year ago.
jacquesm•1h ago
They coasted on momentum for half a year. I don't even think it says anything negative about the current CTO, but more of what an exception JGC is relative to what is normal. A CTO leaving would never show up the next day in the stats, the position is strategic after all. But you'd expect to see the effect after a while, 6 months is longer than I would have expected, but short enough that cause and effect are undeniable.

Even so, it is a strong reminder not to rely on any one vendor for critical stuff, in case that wasn't clear enough yet.

dazc•1h ago
I wondered what happened to him?
brcmthrowaway•1h ago
He's on a yacht somewhere
tedd4u•1h ago
For real
jgrahamc•3m ago
I am reading HN.
dazc•1h ago
Launching a new service every 5 minutes is obviously stretching their resources.
candiddevmike•1h ago
Wait till you see the drama around their horrible terraform provider update/rewrite:

https://github.com/cloudflare/terraform-provider-cloudflare/...

slophater•52m ago
been at cf for 7 yrs but thinking of gtfo soon. the ceo is a manchild, new cto is an idiot, rest of leadership was replaced by yes-men, and the push for AI-first is being a disaster. c levels pretend they care about reliability but pressure teams to constantly ship, cto vibe codes terraform changes without warning anyone, and it's overall a bigger and bigger mess

even the blog, that used to be a respected source of technical content, has morphed into a garbage fire of slop and vaporware announcements since jgc left.

slophater•45m ago
amazing how my comment was flagged in 30 seconds... keep bootlicking
a24446ff87•26m ago
GSD! GSD!! ship! ship! ship!

**everything breaks**

...

**everything breaks again**

oh fuck! Code Orange! I repeat, Code Orange! we need to rebuild trust(R)(TM)! we've let our customers down!

...

**everything breaks again**

Code Orangier! I repeat, Code Orangier!

goalieca•18m ago
I’ve had a lot of problems lately. Basic things are failing and it’s like product isn’t involved at all in the dash. What’s worse? The support.. the chat is the buggiest thing I’ve ever seen.
__turbobrew__•13m ago
You know what they say, shit rolls downhill. I don't personally know the CEO, but the feeling I have got from their public fits on social media doesn't instill confidence.

If I was a CF customer I would be migrating off now.

dryarzeg•1h ago
DaaS - Downtime as a Service©

Just joking, no offence :)

logicchains•10m ago
DaaS is good ja
blibble•1h ago
is this blog post LLM generated?

the explanation makes no sense:

> Because the client is passing pending_delete with no value, the result of Query().Get(“pending_delete”) here will be an empty string (“”), so the API server interprets this as a request for all BYOIP prefixes instead of just those prefixes that were supposed to be removed. The system interpreted this as all returned prefixes being queued for deletion.

client:

     resp, err := d.doRequest(ctx, http.MethodGet, `/v1/prefixes?pending_delete`, nil)
server:

    if v := req.URL.Query().Get("pending_delete"); v != "" {
        // ignore other behavior and fetch pending objects from the ip_prefixes_deleted table
        prefixes, err := c.RO().IPPrefixes().FetchPrefixesPendingDeletion(ctx)
        if err != nil {
            api.RenderError(ctx, w, ErrInternalError)
            return
        }

        api.Render(ctx, w, http.StatusOK, renderIPPrefixAPIResponse(prefixes, nil))
        return
    }
even if the client had passed a value it would have still done exactly the same thing, as the value of "v" (or anything from the request) is not used in that block
bstsb•1h ago
doesn't look AI-generated. even if they have made a mistake, it's probably just from the rush of getting a postmortem out prior to root cause analysis
bretthoerner•1h ago
> even if the client had passed a value it would have still done exactly the same thing, as the value of "v" (or anything from the request) is not used in that block

If they passed in any value, they would have entered the block and returned early with the results of FetchPrefixesPendingDeletion.

From the post:

> this was implemented as part of a regularly running sub-task that checks for BYOIP prefixes that should be removed, and then removes them.

They expected to drop into the block of code above, but since they didn't, they returned all routes.

blibble•1h ago
okay so the code which returned everything isn't there

actual explanation: the API server by default returns everything. the client attempted to make a request to return "pending_deletes", but as the request was malformed, the API instead went down the default path, which returned everything. then the client deleted everything.

makes sense now

but is that explanation is even worse

because that means the code path was never tested?

jbxntuehineoh•36m ago
or they tested it, but not with a dataset that contained prefixes not pending deletion
himata4113•1h ago
yep, no mention that re-advertised prefixes would be withdrawn again as well during the entire impact even after they shut it down.
NinjaTrance•1h ago
The irony is that the outage was caused by a change from the "Code Orange: Fail Small initiative".

They definitely failed big this time.

ssiddharth•1h ago
The eternal tech outage aphorism: It's always DNS, except for when it's BGP.
himata4113•1h ago
This blog post is inaccurate, the prefixes were being revoked over and over - to keep your prefixes advertised you had to have a script that would readd them or else it would be withdrawn again. The way they seemed to word it is really dishonest.
henning•1h ago
Sure vibe-coded slop that has not been properly peer reviewed or tested prior to deployment is leading to major outages, but the point is they are producing lots of code. More code is good, that means you are a good programmer. Reading code would just slow things down.
sp00chy•25m ago
that’s my feeling also. We will get this more and more in future.
VirusNewbie•1h ago
If you track large SaaS and Cloud uptime, it seem to correlate pretty highly with compensation for big companies. Is cloudflare getting top talent?
bombcar•1h ago
Based on IPO date and lockups, I suspect top talent is moving on.
jaboostin•1h ago
Hindsight is 20/20 but why not dry run this change in production and monitor the logs/metrics before enabling it? Seems prudent for any new “delete something in prod” change.
anurag•1h ago
The one redeeming feature of this failure is staged rollouts. As someone advertising routes through CF, we were quite happy to be spared from the initial 25%.
tokyobreakfast•57m ago
Is this trend of oversharing code snippets and TMI postmortems done purposely to distract their customers from raging over the outage and the next impending fuckup?
alansaber•54m ago
Well I still appreciate a good postmortem even if I have no doubt it'll happen again imminently
bdangubic•51m ago
and if they didn’t we’d posting about lack of transparency. damned if you do, damned if you don’t
samrus•20m ago
Just seems like transparency. I agree that we should also judge them based on the frequency of these incidents and amwhether they provide a path to non-repeatability, but i wouldnt criticize them for the transparency per se
NooneAtAll3•48m ago
again?
otar•47m ago
Reliability was/is CF's label.

It's alarming already. Too many outages in the past months. CF should fix it, or it becomes unacceptable and people will leave the platform.

I really hope they will figure things out.

argestes•41m ago
I have many things dependent on Cloudflare. That makes me root for Cloudflare and I think I'm not the only one. Instead of finding better options we're getting stuck on an already failing HA solution. I wonder what caused this.
arcatech•14m ago
Do you not feel concern about you and everybody else deciding to put ALL of their eggs into one basket like this?
alansaber•44m ago
Not sure why everyone is complaining, new MCP features are more important than uptime
dilyevsky•36m ago
> Because the client is passing pending_delete with no value, the result of Query().Get(“pending_delete”) here will be an empty string (“”), so the API server interprets this as a request for all BYOIP prefixes instead of just those prefixes that were supposed to be removed.

Lmao, iirc long time ago Google's internal system had the same exact bug (treating empty as "all" in the delete call) that took down all their edges. Surprisingly there was little impact as traffic just routed through the next set of proxies.

wa008•30m ago
This transparent report can earn my trust
vimda•4m ago
One has to wonder when the board realises Dane was a bad replacement for JGC. These outages are getting ridiculous
user205738•4m ago
They should have rewritten this code in Rust using these brilliant language models. /jk
djfobbz•3m ago
I'm honestly amazed that a company CF's size doesn't have a neat little cluster of Mac Minis running OpenClaw and quietly taking care of this for them.