crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

It’s also worth mentioning that this development comes on the heels of the company’s projected growth estimates for the next five-to-ten years, predicting a worker shortage that the delivery robots can hopefully remedy in the long term. It’s just one way that modern enterprises are using technology to improve the way they run their organizations.

Domino’s Group CEO and Managing Director, Don Meji, states: “Robotic delivery units will complement our existing delivery methods, including cars, scooters, and e-bikes, ensuring our customers can get the hottest, freshest-made pizza delivered directly to them, wherever they are.”

Just think, maybe someday you can have a way to get fresh, delicious pizza delivered right to your front door via autonomous robot. Unfortunately, this does have some limitations. These robots can only deliver to customers within a one-mile radius of their designated Domino’s store, and that’s only in specific cities in Germany and the Netherlands. Also of note is that these battery-powered robots can only move along sidewalks at a speed of no more that four miles per hour, and can only carry a maximum of twenty pounds of food at a time.

The United States, among others, have also been looking into food delivery robots as valid opportunities over the past year. Some examples are U.S.-based companies Postmates and DoorDash. These companies have started to test Starship Technologies’ robots in multiple cities, but that doesn’t mean that you should expect to see robots at your door anytime soon, as only two states currently have legislation passed to make it legal for automated, ground-based robots to deliver food. The two states, Virginia and Idaho, may be joined shortly by other states that have pending legislation on the matter: Florida and Wisconsin.

In Idaho’s case, the state law lets local jurisdictions adopt their own regulations. This gives local governments authority to limit any delivery robot’s speed, and which location within the municipality they are allowed to be in use. If this technology takes hold in these places, many other states will almost certainly follow suit, even though there still is, admittedly, plenty of issues to square away, such as the cost of maintenance and security for these devices.

What are your thoughts about robots delivering pizza? Is it another marketing ploy by a company that is known for their outside-the-box thinking, or is it a viable (meaning cost-effective) alteration in Domino’s current business model? We’d love to read your thoughts in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Malware Email Mobile Devices Business IT Support Software Small Business Hardware Network Server Smartphones Data Communication Upgrade Business Continuity Windows Mobile Device Management VoIP Microsoft Office Disaster Recovery Google Virtualization Computer Efficiency Miscellaneous Mobile Office Vendor Management Holiday Innovation Gadgets Social Media Smartphone User Tips Quick Tips Passwords Mobile Computing Outsourced IT BYOD Android Windows 10 Browser WiFi Data Backup The Internet of Things Remote Monitoring Internet of Things Bring Your Own Device Spam Network Security Ransomware Best Practice Trending Wireless Technology Operating System Apple Data Management Remote Computing Managed IT services Alert Users Content Filtering Going Green Artificial Intelligence History Firewall Data Recovery Gmail Analytics IT Solutions Unified Threat Management Managed IT Save Money Lithium-ion Battery IT Consultant Big Data Office Printer Tech Support Information Technology Current Events App Customer Relationship Management Facebook Windows 8 Router Antivirus Humor Saving Time Encryption Cloud Computing Tech Term Avoiding Downtime Maintenance Hard Drives Business Growth Phone System Outlook Health Managed IT Services Employer-Employee Relationship Website Customer Service Hacking Computers Marketing Excel Document Management Collaboration Cybersecurity Two-factor Authentication Digital Payment Mobile Device Automation VPN Risk Management Apps Application Office Tips Retail Virus Phishing Applications IT service Fax Server Wi-Fi Administration Augmented Reality Office 365 Project Management Proactive IT Password Computer Repair Inbound Marketing Mouse Government Net Neutrality Presentation Social Data Security Budget Compliance PowerPoint Social Networking Regulations Recovery Training Tablet Money Bandwidth Running Cable Licensing iPhone User Error Infrastructure Chrome Co-Managed IT Paperless Office Robot Unified Communications Hiring/Firing HIPAA Productivity Printing End of Support LiFi Piracy Redundancy Computing Statistics Data loss Sports Scam Internet Exlporer Competition Point of Sale Network Congestion Smart Technology Twitter Downtime Mobile Security Search IBM Virtual Desktop USB Files Mobility Business Owner File Sharing Wearable Technology Hacker Programming Tip of the week User Display Alerts Analyitcs Education Help Desk Safety Specifications Hosted Solution Settings Flexibility Cost Management Intranet Wireless Data storage Business Intelligence Cybercrime Save Time Vulnerability Mobile Device Managment Technology Tips Hacks Windows 8.1 Update Recycling Cookies IT Support Blockchain Best Available Documents Entrepreneur Virtual Private Network Halloween Technology Laws Comparison Undo Nanotechnology Adminstration People Permissions 5G PDF Bluetooth 3D IT Technicians Scary Stories Virtual Reality Unified Threat Management Travel Black Friday Online Currency Screen Reader Fraud Monitors Deep Learning Computer Accessories Mirgation SaaS Access Control BDR Cyber Monday Domains Google Wallet Smart Tech Assessment Fun Writing Word Business Technology Storage SharePoint Identity Theft Public Speaking Drones Company Culture Scheduling Connectivity IT Management Cortana Social Engineering eWaste Buisness Identities Touchscreen Networking Migration Telephony Downloads Distributed Denial of Service Backups IoT Network Management Hotspot Knowledge Environment CIO Solid State Drive Chatbots Multi-Factor Security Star Wars Managed IT Service Legal Samsung Debate Windows 10 Language Experience Troubleshooting Google Calendar Heating/Cooling Alt Codes Techology Identity Machine Learning Utility Computing Break Fix Consumers Conferencing Crowdfunding Computing Infrastructure YouTube Private Cloud Legislation Typing Macro Disaster Resistance PC Care Healthcare Software Tips Dark Web IP Address Google Drive Value eBay Server Management Cooperation How To Public Cloud Refrigeration Cryptocurrency Disaster Remote Support IT Consulting Motherboard Leadership Hard Drive New Additions Data Warehousing Google Docs Skype Streaming Media Print Server Gaming Console Text Messaging Staff Sync Software as a Service Bitcoin Digital Signature Work Station Data Breach Modem Memory Cache Congratulations Microsoft Excel LinkedIn communications Law Firm IT Video Surveillance Operations Laptop

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code