Skip to content

The IRS Tax Filing Software TurboTax Is Trying to Kill Just Got Open Sourced

Technology
145 79 45
  • 49 Stimmen
    8 Beiträge
    0 Aufrufe
    B
    But do you also sometimes leave out AI for steps the AI often does for you, like the conceptualisation or the implementation? Would it be possible for you to do these steps as efficiently as before the use of AI? Would you be able to spot the mistakes the AI makes in these steps, even months or years along those lines? The main issue I have with AI being used in tasks is that it deprives you from using logic by applying it to real life scenarios, the thing we excel at. It would be better to use AI in the opposite direction you are currently use it as: develop methods to view the works critically. After all, if there is one thing a lot of people are bad at, it's thorough critical thinking. We just suck at knowing of all edge cases and how we test for them. Let the AI come up with unit tests, let it be the one that questions your work, in order to get a better perspective on it.
  • Understanding the Debate on AI in Electronic Health Records

    Technology technology
    5
    1
    17 Stimmen
    5 Beiträge
    0 Aufrufe
    T
    Well yeah exactly why I said "the same risk". ideally it's going to be in the same systems... and assuming no one is stupid enough (or the laws don't let them) attach it to the publicly accessible forms of existing AIs It's not a new additional risk, just the same one. (though those assumptions are largely there own risks.
  • 𝗙𝗼𝗼𝗺 & Doom: “Brain in a box in a basement”

    Technology technology
    1
    7 Stimmen
    1 Beiträge
    6 Aufrufe
    Niemand hat geantwortet
  • Resurrecting a dead torrent tracker and finding 3 million peers

    Technology technology
    58
    321 Stimmen
    58 Beiträge
    24 Aufrufe
    M
    donating online Yeah i suppose any form of payment that you have to keep secret for some reason is a reason to use crypto, though I struggle to imagine needing that if you're not doing something dodgy avoiding scams for p2p transactions Wat. Crypto is not good at solving that, it's in fact much much worse than traditional payment methods. There's a reason scammers always want to be paid in crypto boycotting the banking system What specifically are you boycotting? The money that backs your crypto (i.e. that you bought it with) still sits in a bank account somewhere and continues to support the banks. All you're boycotting then are payments, but those are usually free for consumers (many banks lose money on them) so you're not exactly "sticking it to the man" by not using them. Evem if you were somehow hurting banks by using crypto, if you think the people that benefit from you using crypto (crypto exchange owners and billionaires that own crypto etc.) are less evil than goverment regulated banks, you're deluded. What about avoiding international payment fees? You'll spend more money using crypto for that, not less
  • 670 Stimmen
    122 Beiträge
    22 Aufrufe
    T
    It's something Americans say.
  • Tide42 – A Fast, Minimalist CLI IDE for Terminal-Centric Devs

    Technology technology
    6
    2
    96 Stimmen
    6 Beiträge
    18 Aufrufe
    anzo@programming.devA
    Emacs has panes. Is this supposed to imitate a fraction of the holy power?
  • 406 Stimmen
    83 Beiträge
    48 Aufrufe
    J
    Of course they don't click anything. Google search has just become a front-end for Gemini, the answer is "served" up right at the top and most people will just take that for Gospel.
  • 141 Stimmen
    4 Beiträge
    7 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]