Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AI Isn’t an Employee Alternative, but a Tool to Assist Users

AI Isn’t an Employee Alternative, but a Tool to Assist Users

The past several years have brought about innovations in artificial intelligence, or AI, that has workers worried for their jobs—especially as it moves into more practical and usable mediums. This can all be tied to the Turing Test, a way of measuring the intelligence of a computer, created by one of the most notable minds behind computing, Alan Turing.

Nowadays, it’s worth asking if comparing the two was the right call; rather, industry professionals think that collaboration between AI and human workers is more preferable compared to competition.

Turing’s Standard May Have Produced Economic Inequities

At the Stanford Digital Economy Lab, director Erik Brynjolfsson claims that advances in AI have created serious issues, economic inequality among them. In the Spring 2022 issue of Dædalus, a journal produced by the American Academy of Arts and Sciences, he writes that the goal of AI swiftly became a mission to overtake the capabilities of the human mind. All of that to say that this mission was not the appropriate way to handle the development of this technology. Brynjolfsson’s work illustrates that this fixation on creating human-like machines has made wage inequality worse.

Brynjolfsson’s argument is that the development of AI has simply removed the need for human employees, and while productivity can increase as a result, the benefits of that productivity are only really reaped by business owners and leaders within organizations. This divide further increases the rift between workers and the rich, increasing the wage gap and creating what is known as “the Turing Trap.”

The creation of AI is just another example of humans attempting to ascend from humanity to become something different entirely, a creator of life in their own image. There are countless examples of this ranging from the golem of Jewish folklore, the automatons built by Daedalus of ancient Greek tales, or the inventors from early Islamic kingdoms and the European Renaissance. Modern popular culture and media does little to separate AI from these stories, as they paint AI as human-like entities seeking to become even more human-like.

If this is the wrong approach, then what is the right one?

According to Brynjolfsson, AI Would Be Better Used as “Augmentation”

Human employees and AI employees are both capable of doing things well, but it’s critical to note that the things they do well are not the same. Therefore, the key to making the most good out of AI is for humans to supplement their shortcomings with it. In essence, humans are “partnering” with AI to produce better results.

Unfortunately, it’s seen as easier to replace rather than integrate AI, simply because there is no true precedent for doing so. Other research has shown that there are various tasks that people would prefer to do themselves rather than AI, so there will always be things that people want to do themselves that AI can, but should not, do. People are worried that automation will replace the human worker, but there are other proponents who argue that AI can only feasibly cover a small portion of the various duties associated with human work.

AI is a Tool, Not Competition

We urge you to think of AI not as an excuse to cut workers, but more of a tool they can use to bring about success for your organization. To discuss your options, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Google Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Microsoft Small Business Workplace Strategy Data Backup Communication Smartphone VoIP Saving Money Business Management Android Smartphones communications Mobile Devices Passwords Backup Data Recovery Managed Service Managed IT Services Microsoft Office Upgrade Browser Social Media Disaster Recovery Network Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Cloud Computing Covid-19 Server Managed Service Provider Miscellaneous Gadgets Remote Work Windows Information Current Events Outsourced IT Productivity Encryption Employee/Employer Relationship Spam Holiday Windows 10 AI Government Office Business Continuity Data Management Compliance Training Windows 10 Business Technology Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Two-factor Authentication Apps Data Security Budget Managed Services Voice over Internet Protocol Vendor Apple Mobile Device Management App Gmail Employer-Employee Relationship Networking Chrome Avoiding Downtime BYOD Applications Access Control Tip of the week WiFi Computing Conferencing Information Technology How To Office 365 BDR Hacker Storage HIPAA Password Router Website Healthcare Bring Your Own Device Marketing Virtual Private Network Health Help Desk Operating System Big Data Retail Risk Management Managed IT Services Analytics Office Tips Augmented Reality Computers Remote Monitoring Vulnerability End of Support Vendor Management Remote Workers Display Printer Paperless Office Free Resource Firewall Infrastructure Project Management Windows 7 Going Green Monitoring Microsoft 365 Document Management The Internet of Things Cybercrime Solutions Social Telephone Scam Data loss Windows 11 Cooperation 2FA Customer Service IT Support Patch Management Excel Save Money Virtual Machines Professional Services Wireless Technology Sports IT Management VPN Meetings Mouse Physical Security iPhone User Tip Modem Word Administration Processor Computer Repair Mobile Security Vulnerabilities Data Privacy Images 101 Smart Technology Mobility Settings Safety Multi-Factor Authentication Wireless Machine Learning Printing Saving Time Content Filtering YouTube Managed IT Service Cryptocurrency Maintenance Employees Downloads Integration Antivirus Licensing Virtual Desktop LiFi Entertainment Customer Relationship Management Data storage Holidays Data Storage Outlook Hacking Supply Chain Telephone System Video Conferencing Presentation Robot Money Cost Management Managed Services Provider Humor Wearable Technology Workplace Hacks Scary Stories Content Gig Economy Health IT Fun Unified Threat Management Motherboard Internet Service Provider Comparison Teamwork Hiring/Firing Evernote Paperless Deep Learning Unified Threat Management Directions Assessment Regulations Compliance IP Address Permissions Memes Co-managed IT Net Neutrality Network Congestion Specifications SQL Server Technology Care Education Recovery Business Communications User Error Microchip Internet Exlporer Financial Data Fraud History IT Hard Drives Scams Mobile Computing Username Smartwatch Search Point of Sale Procurement Domains Black Friday Azure Hybrid Work Tech Human Resources Best Practice Database Telework Cyber security Tech Support IT Technicians Communitications Refrigeration Cables Buisness Network Management CES Proxy Server Cookies Supply Chain Management Public Speaking Monitors Cyber Monday Legal IT solutions Term Google Apps Business Growth Tactics FinTech Lithium-ion battery Hotspot Websites Mirgation IT Assessment IT Maintenance Entrepreneur Cortana Nanotechnology Flexibility Value Business Intelligence Shortcuts Alt Codes SharePoint Addiction Organization Electronic Medical Records Language Digital Security Cameras Chatbots Smart Devices Undo Ransmoware Downtime Management Hosted Solution Lenovo Screen Reader Remote Working Writing Distributed Denial of Service Memory Vendors Data Breach Google Play Be Proactive Typing Service Level Agreement Virtual Reality Computing Infrastructure Videos Private Cloud Identity Electronic Health Records Workforce Server Management Superfish Bookmark Knowledge Identity Theft Smart Tech Wasting Time Threats Google Drive Trend Micro Application Security Cameras Workplace Strategies Download Twitter Alerts 5G Error Software as a Service Meta Unified Communications Browsers Experience Connectivity IBM Social Engineering Break Fix Managing Costs Amazon Google Docs eCommerce SSID Bitcoin Running Cable Upload Remote Computing Surveillance Multi-Factor Security Virtual Assistant Outsource IT Google Wallet Social Network Media Tablet IoT Dark Web Virtual Machine Environment Medical IT Windows 8 Laptop Trends Reviews Alert File Sharing Regulations Development Competition Dark Data Google Calendar Transportation Small Businesses Drones Managed IT Customer Resource management Data Analysis Star Wars How To Microsoft Excel Hypervisor Displays Optimization PowerPoint Halloween Gamification Shopping Notifications Staff Travel Social Networking Legislation Employer/Employee Relationships Outsourcing Navigation Techology Fileless Malware Google Maps PCI DSS User

Blog Archive