Browse Definitions :
Definition

EMMA (Enabling Mobile Machine Automation)

EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.

EMMA enables many manually-operated and powered cleaning machines to operate autonomously with artificial intelligence (AI). Enabling existing machines means that companies can save costs using existing equipment as well as use products they already know to perform to the best results.

The cost of janitorial work is estimated to be 80 percent labor. In the future, labor costs for janitorial work are estimated to increase up to 300 percent. As with many labor jobs, automation can reduce costs and time related to human workers.

Automation of existing machines is enabled by installing a Brain Module in the customer’s floor care machines. Autonomous operation is further enhanced by the Robotic Operation Center (ROC) that provides real time fleet monitoring and remote supervision. ROC also alerts maintenance staff when repairs are needed, reducing downtime.

Along with the Brain module, EMMA makes it possible for equipment to navigate indoors, a difficult task. EMMA learns the environment planning future runs more efficiently. EMMA also avoids changes in obstacles and unexpected human interference with routes.

See also: robot economy

This was last updated in January 2018

Continue Reading About EMMA (Enabling Mobile Machine Automation)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close