Skip to main content

Walmart begins testing online grocery delivery service

walmart-to-go
Image used with permission by copyright holder

It may be one of the ideas that nearly killed Priceline.com, but Walmart thinks it can get you to grocery shop on the Web. The worldwide retailer has begun testing grocery delivery in California in response to Amazon’s recent tests, reports the NY Times. Calling its service “Walmart To Go,” the company now offers those in the San Jose area home delivery of groceries, and other items.

Walmart’s new plan is likely in response to Amazon’s Seattle testing of AmazonTote, a new delivery service that, if combined with Amazon’s other Seattle project, AmazonFresh, would deliver groceries and other items to customers doorsteps in a reusable “tote” bag. Customers can leave the bag out and have it refilled next time their order is fulfilled.

Recommended Videos

The grocery service started on Saturday. Curiously, Walmart to Go also appears to use tote bags. Groceries are delivered in temperature-controlled trucks and deliver groceries the next day. However, options are currently limited as far as portions on fresh items. You can’t, for example, order 2 oranges; you have to order an entire bag. Still, it’s an interesting idea, and a natural step up from the retailer’s “Pick Up Today” service where it lets customers order food online and pick it up–all bundled and bagged–at the store.

But is there any money in this? It costs a lot to truck around merchandise and a number of companies have tried grocery delivery before and none have been terribly successful at it, except in select areas. There’s a reason why the milkman disappeared in this country: people like going to the store and buying groceries. We’ll have to see how well they enjoy having them delivered.

More on Walmart and Amazon’s crazy produce plans as they develop.

Jeffrey Van Camp
Former Digital Trends Contributor
As DT's Deputy Editor, Jeff helps oversee editorial operations at Digital Trends. Previously, he ran the site's…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more