Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Biometrics Can Help with Payment Processing, and Why Some Users Are Worried

How Biometrics Can Help with Payment Processing, and Why Some Users Are Worried

Self-service checkout registers are incredibly popular with Gen Z, and while there are differing opinions on them and their impact on the workforce, there’s no denying that they are here to stay. That said, there is much discussion on whether or not biometric payment processing would make for a more efficient method of checkout. Spoiler alert: it doesn’t, and it’s not welcome for either consumers or organizations.

Amazon One Palm Recognition Experiments with Biometric Payments

The world’s biggest online retailer also has brick-and-mortar stores, and there have been efforts to expand these offerings by providing more services. For instance, Amazon Go and Amazon Go Grocery locations give customers the ability to pick up prepared meals and groceries, all while just using their mobile devices to charge their purchases to their account. This simplifies the shopping process and makes it easier for customers to get what they need without the hassle of visiting the store.

On a similar note, Amazon Style once offered storefronts for selling clothing, and the company has also purchased Whole Foods for organic grocery options.

The most recent implementation Amazon has made to expand further is Amazon One, which is a biometric palm recognition technology that they are testing in the Seattle area. It is used at Whole Foods and Starbucks locations on a trial basis, as well as some convenience stores, retailers in airport terminals, and sports stadiums like Lumen Field.

How Welcome is Amazon One?

Biometrics usually makes things more secure and convenient, but despite these benefits, not all are on board for Amazon One. In fact, three-quarters of consumers are uncomfortable with the technology, and this number has only recently shown improvement over the past few years.

This solidifies that privacy and security are an evergreen concern for individuals. This could show improvement as younger generations grow to become a more prominent part of the consumer body, but as of right now, you’ll want to consider how differences in generational ideologies will change your consumer base, and the technology you provide to make their experience more manageable.

Let Us Help Your Business Implement Better Technology and Processes

If you want your business to use technology to improve processes and productivity, Voyage Technology can help. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Small Business Cybersecurity Microsoft Workplace Strategy Communication Passwords Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Managed Service Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Artificial Intelligence Facebook Current Events Productivity Automation Cloud Computing Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam AI Windows 10 Business Continuity Data Management Compliance Government Office Training Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Business Technology Data Security Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship Vendor WiFi How To Conferencing BDR BYOD Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Applications Tip of the week Augmented Reality Retail Storage Help Desk Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Risk Management Virtual Private Network HIPAA Health Router Website Analytics Office Tips IT Support Document Management Windows 11 Firewall 2FA Monitoring Scam Excel Data loss The Internet of Things Remote Workers Social Telephone Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cooperation Free Resource Project Management Cybercrime Windows 7 Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Money Processor Mobile Security Humor Holidays Maintenance Data Storage Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Safety Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads Robot iPhone Licensing Settings Entertainment Wireless Vulnerabilities Customer Relationship Management Printing Content Filtering Data Privacy IT Management YouTube Meetings Images 101 VPN Hacking Physical Security Multi-Factor Authentication Mobility Presentation Cryptocurrency Telephone System Cost Management Computer Repair Wireless Technology Virtual Desktop Data storage LiFi Employees Integration Outlook Machine Learning User Tip Modem Word Lenovo Writing Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Refrigeration Virtual Reality Scary Stories Private Cloud Proxy Server Reviews Cookies Cyber Monday Medical IT Public Speaking Hacks Server Management Superfish Identity Theft Fun Tactics Development Hotspot Transportation Small Businesses Lithium-ion battery Mirgation Hypervisor Displays Deep Learning Entrepreneur Twitter Error Shopping Nanotechnology Optimization PowerPoint Education Social Engineering Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Undo Remote Computing Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Tablet Search Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Best Practice Alert Regulations Compliance Buisness File Sharing Bookmark Dark Data Smart Tech Memes Co-managed IT Managed IT Legal Application IT solutions How To Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Business Growth Notifications Financial Data Travel Browsers Smartwatch Connectivity IT Break Fix Scams IBM Techology Google Maps Cortana Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework Downtime Unified Threat Management CES IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Regulations Google Calendar Term Google Apps Competition Typing Customer Resource management FinTech Data Analysis Network Congestion Star Wars IT Assessment Microsoft Excel IT Maintenance Google Drive User Error Knowledge Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Organization User Point of Sale Fileless Malware Digital Security Cameras 5G Smart Devices Ransmoware Google Docs Unified Communications Experience Content Remote Working Wearable Technology Memory Vendors Health IT Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Running Cable Tech Support Directions Videos Monitors Assessment Electronic Health Records Permissions Workforce IP Address Google Wallet Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 Laptop Websites Drones Recovery Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon SharePoint Hard Drives Electronic Medical Records Username Halloween eCommerce Black Friday SSID Domains

Blog Archive