Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade VoIP Business Management Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Holiday Information Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 IT Support Business Continuity Data Management Government Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps BYOD Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Chrome Budget Gmail Apple Networking App Employer-Employee Relationship Computing Hacker Information Technology Avoiding Downtime Conferencing Access Control Marketing Office 365 WiFi How To HIPAA BDR Applications Operating System 2FA Help Desk Computers Virtual Private Network Risk Management Health Website Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Vendor Management Windows 11 Cybercrime Customer Service Monitoring Physical Security Excel Display Printer Paperless Office Remote Workers Infrastructure Telephone Document Management Firewall Cooperation Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Content Filtering Holidays IT Management VPN YouTube Meetings Data Storage Smart Technology Supply Chain Hacking Cryptocurrency Video Conferencing Presentation Managed Services Provider Saving Time Computer Repair Virtual Machines Professional Services Wireless Technology Virtual Desktop Managed IT Service Data storage LiFi Downloads iPhone Outlook Word Machine Learning Licensing Money Entertainment Vulnerabilities Humor Data Privacy Maintenance Images 101 Antivirus Sports Multi-Factor Authentication Safety Mobility Mouse Telephone System Cost Management Administration Employees Integration Robot User Tip Modem Processor Settings Mobile Security Customer Relationship Management Printing Wireless Proxy Server Reviews Cookies Cyber Monday Medical IT Unified Threat Management Hosted Solution Typing Tactics Development Hotspot Transportation Small Businesses Competition Mirgation Hypervisor Displays Network Congestion Shopping Knowledge Nanotechnology Optimization PowerPoint Google Drive User Error Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation User Point of Sale Management PCI DSS 5G Gig Economy Experience Screen Reader Distributed Denial of Service Workplace Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity IP Address Evernote Paperless Google Wallet Regulations Compliance Monitors Bookmark Smart Tech Memes Co-managed IT Windows 8 Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Recovery Drones Financial Data Browsers Smartwatch Electronic Medical Records Connectivity IT Break Fix Scams Hard Drives SharePoint Halloween Upload Procurement Azure Hybrid Work Domains Writing Cyber security Multi-Factor Security Tech Human Resources Lenovo Social Network Telework CES Virtual Reality IoT Communitications Dark Web Cables Refrigeration Hacks Server Management Scary Stories Private Cloud Trends Supply Chain Management Public Speaking Fun Regulations Lithium-ion battery Google Calendar Term Google Apps Superfish Identity Theft Customer Resource management FinTech Deep Learning Data Analysis Twitter Star Wars IT Assessment Microsoft Excel IT Maintenance Entrepreneur Error Gamification Flexibility Staff Value Business Intelligence Social Engineering Social Networking Legislation Shortcuts Education Organization Fileless Malware Digital Security Cameras Remote Computing Smart Devices Ransmoware Undo Mobile Computing Content Remote Working Wearable Technology Memory Vendors Search Motherboard Data Breach Comparison Google Play Be Proactive Tablet Health IT Best Practice Directions Videos Alert Assessment Electronic Health Records Permissions Workforce Managed IT Buisness File Sharing Dark Data Wasting Time Threats How To Trend Micro Specifications Security Cameras Workplace Strategies Application Legal IT solutions Business Growth Microchip Notifications Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon IBM Travel Username Cortana eCommerce Black Friday SSID Techology Google Maps Alt Codes Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Downtime Unified Threat Management

Blog Archive