DoD and Commercial Advanced Waveform Developments and Programs with Multiple Nunn-McCurdy Breaches, Volume 5

DoD and Commercial Advanced Waveform Developments and Programs with Multiple Nunn-McCurdy Breaches, Volume 5

Mark V. Arena
Irv Blickstein
Daniel Gonzales
Sarah Harting
Jennifer Lamping Lewis
Michael McGee
Megan McKernan
Charles Nemfakos
Jan Osburg
Rena Rudavsky
Jerry M. Sollinger
Copyright Date: 2014
Published by: RAND Corporation
Pages: 140
https://www.jstor.org/stable/10.7249/j.ctt14bs3w4
  • Cite this Item
  • Book Info
    DoD and Commercial Advanced Waveform Developments and Programs with Multiple Nunn-McCurdy Breaches, Volume 5
    Book Description:

    The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have exceeded certain cost thresholds more than once.

    eISBN: 978-0-8330-9009-6
    Subjects: History, Technology, Political Science

Table of Contents

  1. Front Matter
    (pp. i-ii)
  2. Preface
    (pp. iii-iv)
  3. Table of Contents
    (pp. v-vi)
  4. Figures
    (pp. vii-viii)
  5. Tables
    (pp. ix-x)
  6. Summary
    (pp. xi-xviii)
  7. Acknowledgments
    (pp. xix-xx)
  8. Abbreviations
    (pp. xxi-xxviii)
  9. CHAPTER ONE Joint Tactical Radio System
    (pp. 1-58)

    This chapter presents the results of the study examining the Army’s JTRS program that uses industry’s LTE waveform. It begins with a discussion of the JTRS program background and then describes the objectives of the research. Next, we discuss the analytic approach taken to accomplish the objectives. The following section describes the JTRS architecture, to include a discussion of the JTRS hardware, software, and security architecture. We then summarize the LTE architecture, to include a discussion of the LTE security architecture, software architecture, and description of commercial and DoD deployments. Then we compare the development approaches and organizational structures for...

  10. CHAPTER TWO Multiple Nunn-McCurdy Breaches
    (pp. 59-100)

    The Performance Assessments and Root Cause Analysis (PARCA) office asked RAND to review programs that had breached Nunn-McCurdy thresholds with the main objective of understanding how these program breaches evolved. We were asked the following three research questions:

    Are programs that have a Nunn-McCurdy breach more likely to breach again?

    What can we learn from the cost growth trends of those programs that have had multiple Nunn-McCurdy breaches?

    What can we learn from the management actions taken on programs with multiple breaches? Are there common issues that were missed at the first breach?

    We used a two-phased analytic approach for...

  11. APPENDIX A Nunn-McCurdy Legislation
    (pp. 101-106)
  12. APPENDIX B List of Programs with at Least One Nunn-McCurdy Breach (1997–2011)
    (pp. 107-108)
  13. References
    (pp. 109-112)