Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Managed Service Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Current Events Automation Artificial Intelligence Facebook Productivity Gadgets Cloud Computing Covid-19 Miscellaneous AI Remote Work Server Managed Service Provider Outsourced IT Information Holiday Spam Encryption Employee/Employer Relationship Windows 10 Compliance Office Data Management Business Continuity Government Training Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Apps Data Security Mobile Office Two-factor Authentication Mobile Device Management Gmail Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Employer-Employee Relationship App BYOD Vendor Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Hacker Computing Applications Avoiding Downtime Information Technology Marketing Access Control Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Computers Operating System HIPAA Router Virtual Private Network Risk Management Website Health Monitoring Firewall Document Management Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Windows 11 Display 2FA Printer Paperless Office Infrastructure Excel Data Storage Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Safety Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Data Privacy Licensing Administration Vulnerabilities Entertainment Images 101 Customer Relationship Management Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Hacking Presentation Content Filtering IT Management VPN Employees YouTube Meetings Wireless Technology Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Supply Chain Virtual Desktop Holidays LiFi Word Data storage Windows 8 Workplace Laptop Websites Mirgation Hypervisor Refrigeration PowerPoint Drones Shopping Hiring/Firing Nanotechnology Optimization Addiction Paperless Public Speaking Electronic Medical Records Language Employer/Employee Relationships SharePoint Management PCI DSS Co-managed IT Lithium-ion battery Halloween Chatbots Navigation Writing Distributed Denial of Service Entrepreneur Lenovo Gig Economy Technology Care Screen Reader Service Level Agreement Internet Service Provider Business Communications Virtual Reality Computing Infrastructure Teamwork Hacks Server Management Regulations Compliance Scams Scary Stories Private Cloud Identity Evernote Undo Fun Superfish Bookmark Hybrid Work Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Human Resources Twitter Alerts SQL Server Financial Data Cables Error History Social Engineering Break Fix Browsers Smartwatch Education Connectivity IT Upload Procurement Google Apps Remote Computing Azure Mobile Computing Social Network Telework IT Maintenance Cyber security Application Multi-Factor Security Tech Tablet IoT Communitications Search Dark Web CES Business Intelligence Best Practice Trends Supply Chain Management Shortcuts IBM Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Ransmoware Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Legal Data Analysis Vendors Business Growth Gamification Flexibility Be Proactive Notifications Staff Value Legislation Organization Workforce Travel Social Networking Google Maps Smart Devices Competition Cortana Techology Fileless Malware Digital Security Cameras Threats Alt Codes Content Remote Working Workplace Strategies Wearable Technology Memory Comparison Google Play Health IT Meta Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Amazon Typing Wasting Time User Network Congestion Specifications Security Cameras Outsource IT Trend Micro Internet Exlporer Software as a Service Media Knowledge Fraud Google Drive User Error Microchip Environment Username IP Address Managing Costs 5G Black Friday SSID Small Businesses Point of Sale eCommerce Displays Unified Communications Database Surveillance Experience Virtual Assistant Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Recovery Hard Drives Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Outsourcing Cookies Tactics Development Domains Hotspot Transportation

Blog Archive