LEADER 03324nam 2200469 450 001 9910220144203321 005 20220906170839.0 010 $a0-8330-9009-7 035 $a(CKB)3710000000413658 035 $a(WaSeSS)IndRDA00120865 035 $a(EXLCZ)993710000000413658 100 $a20200607d2014 uh 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches. Volume 5 /$fMark V. Arena [et al.] 210 1$aSanta Monica, Ca :$cRAND Corporation,$d2014. 215 $a1 online resource (xxvii, 112 pages) $ccolor illustrations 225 $aRoot cause analyses of Nunn-McCurdy breaches 300 $a"Prepared for the Office of the Secretary of Defense." 311 1 $a0-8330-8734-7 327 $gv. 1.$tZumwalt-class destroyer, Joint Strike Fighter, Longbow Apache, and Wideband Global Satellite /$rIrv Blickstein [and fifteen others] --$gv. 2.$tExcalibur artillery projectile and the Navy Enterprise Resource Planning Program : with an approach to analyzing program complexity and risk /$rIrv Blickstein [and seven others] --$gv. 4.$tProgram manager tenure, oversight of acquisition category II programs, and framing assumptions /$rMark V. Arena [and twelve others] --$gv. 5.$tDoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches / Mark V. Arena [and ten others] --$gv. 6.$tContractor motivations and anticipating breaches /$rMark V. Arena [and 11 others] --$gv. 7.$tAcquisition of space systems : past problems and future challenges /$rYool Kim [and 13 others] --$gv. 8.$tJoint precision approach and landing system /$rJennifer Kavanagh [and 10 others] 330 $aThe report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform (WNW) and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have repeatedly exceeded certain cost thresholds. The first study compares differences in system designs, technical requirements, intellectual property protection schemes, and cost in the development of WNW. It also examined how technical risks and challenging requirements contributed to schedule and cost increases. The second study attempts to identify unique characteristics of programs that overrun their budgets more than once. 606 $aDestroyers (Warships) 606 $aF-35 (Military aircraft) 606 $aApache (Attack helicopter) 607 $aUnited States$xDepartment of Defense$xProcurement$xCosts 607 $aUnited States$xDepartment of Defense$xAppropriations and expenditures 607 $aUnited States$xArmed Forces$xWeapons systems$xCosts 615 0$aDestroyers (Warships) 615 0$aF-35 (Military aircraft) 615 0$aApache (Attack helicopter) 676 $a355.6212 700 $aArena$b Mark V.$01242192 801 0$bWaSeSS 801 1$bWaSeSS 906 $aBOOK 912 $a9910220144203321 996 $aDoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches$92903480 997 $aUNINA