Browse Definitions :
Definition

EMMA (Enabling Mobile Machine Automation)

EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.

EMMA enables many manually-operated and powered cleaning machines to operate autonomously with artificial intelligence (AI). Enabling existing machines means that companies can save costs using existing equipment as well as use products they already know to perform to the best results.

The cost of janitorial work is estimated to be 80 percent labor. In the future, labor costs for janitorial work are estimated to increase up to 300 percent. As with many labor jobs, automation can reduce costs and time related to human workers.

Automation of existing machines is enabled by installing a Brain Module in the customer’s floor care machines. Autonomous operation is further enhanced by the Robotic Operation Center (ROC) that provides real time fleet monitoring and remote supervision. ROC also alerts maintenance staff when repairs are needed, reducing downtime.

Along with the Brain module, EMMA makes it possible for equipment to navigate indoors, a difficult task. EMMA learns the environment planning future runs more efficiently. EMMA also avoids changes in obstacles and unexpected human interference with routes.

See also: robot economy

This was last updated in January 2018

Continue Reading About EMMA (Enabling Mobile Machine Automation)

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close