Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Passwords Data Backup Communication Smartphone Backup Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Current Events Internet of Things Facebook Productivity Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing AI Miscellaneous Remote Work Server Managed Service Provider Information Holiday Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Compliance Government Training Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Vendor Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking How To WiFi BDR Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing IT Support Tip of the week Conferencing Big Data Operating System HIPAA Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services The Internet of Things Cooperation Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Physical Security 2FA Customer Service Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Document Management Free Resource Firewall Project Management Telephone Scam Windows 7 Data loss Microsoft 365 Robot Employees Telephone System Integration Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings Holidays VPN Data Storage Cryptocurrency Modem Hacking User Tip Supply Chain Processor Presentation Computer Repair Mobile Security Video Conferencing Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage LiFi Wireless Technology Smart Technology Outlook Machine Learning Money Saving Time iPhone Humor Word Managed IT Service Vulnerabilities Data Privacy Maintenance Downloads Antivirus Sports Mouse Images 101 Licensing Multi-Factor Authentication Mobility Safety Entertainment Administration Remote Working Memory Vendors Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Data Breach Managed IT Customer Resource management Google Play Be Proactive Legal Data Analysis Workforce IT solutions Star Wars How To Microsoft Excel Videos Electronic Health Records Wasting Time Threats Business Growth Gamification Notifications Staff Travel Social Networking Application Legislation Trend Micro Security Cameras Workplace Strategies Techology Fileless Malware Meta Google Maps Cortana Software as a Service Managing Costs Amazon Alt Codes Content IBM Wearable Technology Downtime Unified Threat Management Motherboard Comparison eCommerce Health IT SSID Unified Threat Management Directions Virtual Assistant Outsource IT Hosted Solution Assessment Permissions Surveillance Virtual Machine Environment Typing Media Network Congestion Specifications Reviews Medical IT Google Drive User Error Microchip Transportation Small Businesses Internet Exlporer Competition Knowledge Fraud Development Hypervisor Displays Username Point of Sale 5G Black Friday Shopping Optimization PowerPoint Google Docs Employer/Employee Relationships Outsourcing Unified Communications Database Experience PCI DSS Bitcoin Network Management Navigation Running Cable Tech Support IT Technicians User Cookies Monitors Cyber Monday Gig Economy Google Wallet Proxy Server Workplace Teamwork Hiring/Firing Tactics Hotspot Internet Service Provider Regulations Compliance Windows 8 Evernote Paperless IP Address Laptop Websites Mirgation Nanotechnology Memes Drones Co-managed IT SharePoint SQL Server Technology Care Addiction Electronic Medical Records Language Net Neutrality Recovery Financial Data History Management Business Communications Halloween Chatbots Screen Reader Hard Drives Writing Distributed Denial of Service Smartwatch IT Lenovo Scams Azure Hybrid Work Service Level Agreement Domains Virtual Reality Computing Infrastructure Procurement Telework Cyber security Hacks Server Management Tech Human Resources Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration Fun CES Communitications Superfish Bookmark Cables Supply Chain Management Deep Learning Download Public Speaking Twitter Alerts FinTech Term Google Apps Lithium-ion battery Error Browsers IT Maintenance Education Connectivity Social Engineering Break Fix Entrepreneur IT Assessment Flexibility Value Business Intelligence Upload Remote Computing Multi-Factor Security Organization Mobile Computing Social Network Shortcuts Ransmoware Tablet IoT Undo Search Dark Web Digital Security Cameras Smart Devices

Blog Archive