Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade Data Recovery VoIP Business Management AI Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Holiday Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Computers 2FA Help Desk Health Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Risk Management Virtual Private Network Printer Windows 11 Paperless Office Monitoring Infrastructure Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Microsoft 365 Social Going Green Patch Management Save Money Remote Monitoring Solutions End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Holidays Presentation Computer Repair Virtual Desktop Data Storage Data storage LiFi Wireless Technology Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Outlook Virtual Machines Professional Services Machine Learning Money Humor Managed IT Service Word Downloads Maintenance iPhone Sports Antivirus Licensing Mouse Entertainment Vulnerabilities Safety Data Privacy Administration Images 101 Multi-Factor Authentication Mobility Telephone System Cost Management Robot Settings Wireless Printing Content Filtering Employees IT Management Customer Relationship Management Integration YouTube Meetings VPN Modem User Tip Processor Cryptocurrency Mobile Security Hacking Proxy Server Reviews Google Docs Cookies Unified Communications Cyber Monday Medical IT Experience Tactics Development Bitcoin Network Management Hotspot Transportation Small Businesses Running Cable Tech Support User Mirgation Hypervisor Displays Monitors Google Wallet Shopping Nanotechnology Optimization PowerPoint Addiction Windows 8 IP Address Language Employer/Employee Relationships Outsourcing Laptop Websites Chatbots Navigation Management PCI DSS Drones Gig Economy SharePoint Screen Reader Distributed Denial of Service Workplace Electronic Medical Records Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Halloween Identity Hard Drives Evernote Paperless Writing Regulations Compliance Lenovo Bookmark Smart Tech Memes Domains Co-managed IT Virtual Reality Download Net Neutrality Hacks Server Management Alerts SQL Server Technology Care Scary Stories Private Cloud Superfish History Identity Theft Refrigeration Business Communications Fun Financial Data Browsers Smartwatch Connectivity IT Deep Learning Public Speaking Break Fix Scams Twitter Error Upload Procurement Lithium-ion battery Azure Hybrid Work Cyber security Education Multi-Factor Security Tech Human Resources Social Engineering Entrepreneur Social Network Telework CES IoT Communitications Dark Web Cables Remote Computing Trends Supply Chain Management Mobile Computing Regulations Tablet Undo Google Calendar Term Google Apps Search Customer Resource management FinTech Data Analysis Star Wars IT Assessment Best Practice Microsoft Excel IT Maintenance Alert Buisness File Sharing Dark Data Gamification Flexibility Managed IT Staff Value Business Intelligence Legal Social Networking IT solutions Legislation Shortcuts How To Organization Fileless Malware Digital Security Cameras Smart Devices Business Growth Ransmoware Notifications Travel Application Content Remote Working Wearable Technology Memory Vendors Techology Motherboard Data Breach Google Maps Comparison Google Play Be Proactive Cortana Health IT Directions Videos Assessment Electronic Health Records Alt Codes IBM Permissions Workforce Downtime Unified Threat Management Wasting Time Threats Unified Threat Management Trend Micro Hosted Solution Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Typing Fraud Meta Network Congestion Username Managing Costs Amazon Google Drive User Error eCommerce Competition Black Friday SSID Knowledge Database Surveillance Virtual Assistant Outsource IT Point of Sale Media 5G IT Technicians Virtual Machine Environment

Blog Archive