(biz´n&s pros´ses) (n.)
(1) A business transaction that requests information from or changes the data in a database.
(2) A specific event in a chain of structured business activities. The event typically changes the state of data and/or a product and generates some type of output. Examples of business processes include receiving orders, invoicing, shipping products, updating employee information, or setting a marketing budget. Business processes occur at all levels of an organization’s activities and include events that the customer sees and events that are invisible to the customer. The term also refers to the amalgam of all the separate steps toward the final business goal.
- business recovery team
A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes. Also called a disaster recovery team. [Source: Disaster Recovery Journal]
- business recovery timeline
The chronological sequence of recovery activities, or critical path, that must be followed to resume an acceptable level of operations following a business interruption or outage. This timeline may range from minutes to weeks, depending upon the recovery requirements and methodology. [Source: Disaster Recovery Journal]
- business rule engine
Abbreviated as BRE, business rule engine is the term used to describe software used to track, manage and revise enterprise business processes. This software system typically executes business rules that might be derived from legal regulations or in-house corporate policies. BREs can be used alone or in conjunction with other technologies, like Business Process Management […]
- business service management
Business service management (BSM) is an IT management buzzword that has been adopted by many vendors that are using the term to market their products and services. BSM, as a technology term, refers to managing IT based on end-to-end services. It also conveys an understanding of the marketing place for enterprise products considering the work […]
Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker […]