THE WHATIS.COM WORD-OF-THE-DAY   
June 6, 2002

IDEF 
______________
TODAY'S SPONSOR: The .tv Corporation

Save 30% on Web addresses!
Not only will you get a great deal on your Web addresses, but you'll
also get superior customer service, innovative products and services
and a place that is easy to register and manage your Web addresses. 
Great names are still available. Register the names you want before
someone else does! Check it out now:
http://WhatIs.com/r/0,,3768,00.htm?the.tvcorporation
______________   
TODAY'S WORD: IDEF 

See our definition with hyperlinks at
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci831251,00.html

IDEF (for Integrated Definition) is a group of modeling methods that
can be used to describe operations in an enterprise. IDEF was created
by the United States Air Force and is now being developed by
Knowledge Based Systems. Originally developed for the manufacturing
environment, IDEF methods have been adapted for wider use and for
software development in general. 

Sixteen methods, from IDEF0 to IDEF14 (and including IDEF1X), are
each designed to capture a particular type of information through
modeling processes. IDEF methods are used to create graphical
representations of various systems, analyze the model, create a model
of a desired version of the system, and to aid in the transition from
one to the other. IDEF is sometimes used along with gap analysis. 

The following table lists the IDEF methods either current or in
development. IDEF0 through IDEF4 are the methods most commonly used. 

   IDEF METHODS

IDEF0     Function Modeling
IDEF1     Information Modeling
IDEF1X    Data Modeling
IDEF2     Simulation Model Design
IDEF3     Process Description Capture
IDEF4     Object-Oriented Design
IIDEF5    Ontology Description Capture
IDEF6     Design Rationale Capture
IDEF7     Information System Auditing
IDEF8     User Interface Modeling
IDEF9     Scenario-Driven IS Design
IDEF10    Implementation Architecture Modeling
IDEF11    Information Artifact Modeling
IDEF12    Organization Modeling
IDEF13    Three Schema Mapping Design
IDEF14    Network Design

As an example of the process, IDEF0 methods are used to model the
functions of an enterprise, creating a graphical model that shows:
what controls the function, who performs it, what resources are used
in carrying it out, what it produces, and what relationships it has
to other functions. 

RELATED TERMS:

enterprise
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci212065,00.html

Unified Modeling Language
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci214158,00.html 
______________________
SELECTED LINKS:

The IDEF Web site explains the IDEF family of methods in detail. 
http://www.idef.com/

Popkin Software provides additional information about IDEF. 
http://government.popkin.com/methods/idef.htm

SearchWebServices includes modeling products in its list of "Best Web
Links for Product Briefs and Reviews." 
http://searchwebservices.techtarget.com/bestWebLinks/0,289521,sid26_tax288570,00.html
______________________
WHATIS DISCUSSION FORUM | The Virtual Watercooler

It's been fun (and informative) hanging around the new whatis.com
discussion forum. It feels a little like talking to co-workers in the
lunch room.

TODAY'S QUESTION: What other IT newsletters do you subscribe to?

Add your two cents to the discussion and you automatically have a
chance to win
a magical TechTarget baseball cap! Wearing it will make you smarter.
http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^6@.1dcf9e64!viewtype=&skip=&expand=
______________________
QUIZ #27 | Security awareness for end users

Studies show that a company's biggest security threat is its own
employees. The SANS Institute recommends that organizations should
take time to educate their employees about computer security and
periodically test employees to make sure they understand the basics.
To help you in your efforts to raise security awareness in your
organization, we've created the following quiz:
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci826572,00.html 
_________________________________________________________
LESS THAN 3 WEEKS UNTIL OUR FREE SECURITY DECISIONS EVENT

Time's running out to attend Security Decisions June 19-21 
at the Hilton Chicago Hotel. There are still seats left but 
you should act now or risk being shut out. FREE attendance 
available at: http://www.securityconf.com/html/registration.htm

Benefit from top strategies to make the most cost-effective 
security purchases, expert tactics to close specific security 
holes in your system, and the most effective ways to manage 
network security (without breaking the bank). Apply today!
______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] Fax Group 
http://whatis.techtarget.com/definition/0,,sid9_gci827309,00.html

[2] IPLC 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci827417,00.html

[3] restore point 
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci827077,00.html

[4] glocalization 
http://searchebusiness.techtarget.com/sDefinition/0,,sid19_gci826478,00.html

[5] GLONASS 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci826952,00.html
____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Assistant Editor ([EMAIL PROTECTED])
___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Created by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

If you would like to sponsor this or any techtarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to