Amazon Is Using AI To Transform Retail

Amazon.com has its first bricks & mortar shop and  is using machine learning to try to change the retail experience. 

Using a combination of machine learning, computer vision, sensors and deep learning, the smart store is designed to keep track of what users take off and return to shelves so it can track their purchases in a virtual cart.

When they're done, customers can just leave the store with their purchases; Amazon will charge their account and send them a receipt.

"We created the world's most advanced shopping technology so you never have to wait in line," the company said on its site. "With our Just Walk Out Shopping experience, simply use the Amazon Go app to enter the store, take the products you want, and go! No lines, no checkout. No, seriously!"

The 1,800-square-foot store, located at 2131 7th Ave. in Seattle, is in beta testing now so only Amazon employees are able to use it. The company expects it to be open to the general public in early 2017.

The store sells pre-made meals for breakfast, lunch and dinner and snacks made by on-site chefs and local bakeries. It also stocks milk and bread, along with meal kits, local chocolates and artisan cheese.

Customers only need an Amazon account, a smartphone and the Amazon Go app. "Four years ago we asked ourselves: what if we could create a shopping experience with no lines and no checkout?" Amazon said in its statement. "Could we push the boundaries of computer vision and machine learning to create a store where customers could simply take what they want and go? Our answer to those questions is Amazon Go and Just Walk Out Shopping."

Patrick Moorhead, an analyst with Moor Insights & Strategy, said he's intrigued by the concept and a bit surprised that a major retail brand already ensconced in brick-and-mortar stores didn't come up with it first.

"Automatic checkout is absolutely a characteristic of the store of the future," said Moorhead. "But I can see Amazon doing this to drive even more growth by going brick-and-mortar. The only way to be successful in brick-and-mortar is to change the game, and in this case, changing the game with checkout."

He also noted that this is a good use of smart technology. "This is the ultimate way to use this technology in retail," said Moorhead. "The challenge with all technology like this is accuracy. What if the system charges you for something you didn't take? That could be the big challenge to the system."

One of the biggest problems could be if the technology doesn't notice that a shopper picked up an item to look at it and then put it back. If the shopper is charged for something he didn't take, he wouldn't get the receipt and notice the false charge until after he left the store.

"If customers were charged for things they didn't take, it could lead to high customer dissatisfaction," said Moorhead. "If a bad experience is continuous, it could quickly drive customers away so they just stop using it."

Compuetrworld:              Retailers Are Hardest Hit by Malware:

 

« Russia Has Foiled Cyberattacks By A Foreign Spy Agency
Mastercard Hypes Artificial Intelligence »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.

Coana

Coana

Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time.