Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Productivity Upgrade Android VoIP Business Management Smartphones Data Recovery Mobile Devices communications Disaster Recovery Browser Social Media Windows Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Information Automation Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Managed Service Provider Remote Work Training Server Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers 2FA Health Help Desk Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management The Internet of Things Cooperation Windows 7 Microsoft 365 Going Green Patch Management Social Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Cybercrime Physical Security Customer Service Display Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Virtual Machines Professional Services Outlook Machine Learning Money Saving Time Word Humor Managed IT Service Maintenance iPhone Antivirus Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Safety Entertainment Administration Images 101 Multi-Factor Authentication Mobility Telephone System Robot Cost Management Settings Printing Wireless Content Filtering Employees IT Management Customer Relationship Management Integration VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Holidays Processor Virtual Desktop Data Storage Wireless Technology Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Smart Technology Addiction Electronic Medical Records Language Gig Economy Workplace SharePoint Management Halloween Chatbots Recovery Internet Service Provider Teamwork Hiring/Firing Writing Distributed Denial of Service Regulations Compliance Evernote Paperless Lenovo Screen Reader Hard Drives Service Level Agreement Domains Virtual Reality Computing Infrastructure Memes Co-managed IT SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Identity Net Neutrality Fun Financial Data History Business Communications Superfish Bookmark Identity Theft Smart Tech Refrigeration Deep Learning Download Public Speaking Twitter Alerts Smartwatch IT Scams Azure Hybrid Work Lithium-ion battery Error Procurement Social Engineering Break Fix Telework Entrepreneur Cyber security Tech Human Resources Browsers Education Connectivity Upload Remote Computing CES Communitications Cables Mobile Computing Social Network Multi-Factor Security Supply Chain Management Search Dark Web FinTech Term Google Apps Tablet IoT Undo Best Practice Trends Alert IT Assessment IT Maintenance Value Business Intelligence Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Flexibility How To Microsoft Excel Organization Shortcuts Legal Data Analysis IT solutions Star Wars Business Growth Gamification Notifications Staff Digital Security Cameras Smart Devices Ransmoware Memory Vendors Travel Social Networking Application Legislation Remote Working Cortana Data Breach Google Play Be Proactive Techology Fileless Malware Google Maps Alt Codes Content IBM Wearable Technology Videos Electronic Health Records Workforce Wasting Time Threats Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Trend Micro Security Cameras Workplace Strategies Unified Threat Management Directions Hosted Solution Assessment Typing Software as a Service Meta Managing Costs Amazon Network Congestion Specifications Knowledge Fraud eCommerce SSID Google Drive User Error Microchip Internet Exlporer Competition Username Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Media Point of Sale 5G Black Friday Experience Reviews Medical IT Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians User Development Transportation Small Businesses Hypervisor Displays Google Wallet Proxy Server Cookies Monitors Cyber Monday Hotspot Shopping Optimization PowerPoint Tactics Windows 8 IP Address Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Navigation Drones Nanotechnology PCI DSS

Blog Archive