Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Biometrics Can Help with Payment Processing, and Why Some Users Are Worried

How Biometrics Can Help with Payment Processing, and Why Some Users Are Worried

Self-service checkout registers are incredibly popular with Gen Z, and while there are differing opinions on them and their impact on the workforce, there’s no denying that they are here to stay. That said, there is much discussion on whether or not biometric payment processing would make for a more efficient method of checkout. Spoiler alert: it doesn’t, and it’s not welcome for either consumers or organizations.

Amazon One Palm Recognition Experiments with Biometric Payments

The world’s biggest online retailer also has brick-and-mortar stores, and there have been efforts to expand these offerings by providing more services. For instance, Amazon Go and Amazon Go Grocery locations give customers the ability to pick up prepared meals and groceries, all while just using their mobile devices to charge their purchases to their account. This simplifies the shopping process and makes it easier for customers to get what they need without the hassle of visiting the store.

On a similar note, Amazon Style once offered storefronts for selling clothing, and the company has also purchased Whole Foods for organic grocery options.

The most recent implementation Amazon has made to expand further is Amazon One, which is a biometric palm recognition technology that they are testing in the Seattle area. It is used at Whole Foods and Starbucks locations on a trial basis, as well as some convenience stores, retailers in airport terminals, and sports stadiums like Lumen Field.

How Welcome is Amazon One?

Biometrics usually makes things more secure and convenient, but despite these benefits, not all are on board for Amazon One. In fact, three-quarters of consumers are uncomfortable with the technology, and this number has only recently shown improvement over the past few years.

This solidifies that privacy and security are an evergreen concern for individuals. This could show improvement as younger generations grow to become a more prominent part of the consumer body, but as of right now, you’ll want to consider how differences in generational ideologies will change your consumer base, and the technology you provide to make their experience more manageable.

Let Us Help Your Business Implement Better Technology and Processes

If you want your business to use technology to improve processes and productivity, Voyage Technology can help. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Small Business Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Upgrade Mobile Devices Managed Service Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Tech Term Remote Network Internet of Things Current Events Automation Artificial Intelligence Facebook Productivity Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Miscellaneous Remote Work Outsourced IT Information Holiday Encryption Spam Employee/Employer Relationship Windows 10 Office Compliance Data Management Business Continuity Government Training Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Chrome Networking Gmail Budget Apple BYOD Vendor App Employer-Employee Relationship Computing Hacker Information Technology Tip of the week Avoiding Downtime Conferencing Marketing Office 365 IT Support How To BDR WiFi Applications Access Control Computers Help Desk Risk Management Website Retail Healthcare Office Tips Analytics Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Operating System Health Monitoring 2FA Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Social Vendor Management Solutions Physical Security Going Green Display Printer Windows 11 Customer Service Paperless Office Infrastructure Cybercrime Presentation Data Storage YouTube Smart Technology Supply Chain Cryptocurrency Video Conferencing Wireless Technology Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Virtual Desktop Managed IT Service Data storage LiFi Maintenance Antivirus Word Downloads iPhone Outlook Licensing Money Vulnerabilities Humor Entertainment Data Privacy Safety Images 101 Sports Mouse Telephone System Multi-Factor Authentication Robot Mobility Cost Management Administration IT Management VPN Employees Meetings Integration Customer Relationship Management User Tip Modem Settings Computer Repair Mobile Security Processor Printing Wireless Holidays Content Filtering Hacking Websites Mirgation Hypervisor Displays PowerPoint Google Drive Shopping User Nanotechnology Optimization Knowledge Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Chatbots 5G Navigation Experience Writing Distributed Denial of Service Workplace IP Address Google Docs Lenovo Gig Economy Unified Communications Screen Reader Bitcoin Service Level Agreement Internet Service Provider Running Cable Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Google Wallet Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Recovery Identity Theft Smart Tech Memes Hard Drives Windows 8 Download Net Neutrality Laptop Twitter Alerts SQL Server Technology Care Domains Drones Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Refrigeration Upload Procurement Halloween Remote Computing Azure Hybrid Work Public Speaking Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Lithium-ion battery CES Tablet IoT Communitications Hacks Trends Supply Chain Management Entrepreneur Scary Stories Alert Managed IT Customer Resource management FinTech File Sharing Regulations Fun Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Deep Learning Star Wars IT Assessment Undo Gamification Flexibility Notifications Staff Value Business Intelligence Organization Education Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Mobile Computing Content Remote Working Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Search Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Application Best Practice Assessment Electronic Health Records Buisness Wasting Time Threats IBM Legal IT solutions Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Fraud Meta User Error Microchip Business Growth Username Managing Costs Amazon Black Friday SSID Point of Sale eCommerce Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes Competition Network Management Downtime Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Hosted Solution Cookies Tactics Development Hotspot Transportation Small Businesses Typing

Blog Archive