It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:235233328:3626
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:235233328:3626?format=raw

LEADER: 03626cam a2200601Ia 4500
001 014172061-1
005 20141028074625.0
008 140822s2014 cauad b 000 0 eng d
020 $a0833087347 (pbk.) :$c$34.95
020 $a9780833087348 (pbk.) :$c$34.95
035 0 $aocn888551777
040 $aYDXCP$beng$cYDXCP$dBDX$dBTCTA$dSYB$dKSG
043 $an-us---
050 4 $aUA17$b.D63 2014
050 4 $aUF503$b.D63 2014
082 04 $a355.6/212$223
088 $aMG-1171/5-OSD
245 00 $aDoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches.$nVolume 5 /$cMark V. Arena, Irv Blickstein, Daniel Gonzales, Sarah Harting, Jennifer Lamping Lewis, Michael McGee, Megan McKernan, Charles Nemfakos, Jan Osburg, Rena Rudavsky, Jerry M. Sollinger.
246 3 $aDepartment of Defense and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches
260 $aSanta Monica, CA :$bRAND Corporation,$cc2014.
300 $axxvii, 112 pages :$billustrations (chiefly color), color graphs ;$c26 cm.
500 $a"RAND Corporation monograph series."--Web page (PDF).
500 $a"MG-1171/5-OSD."--Page 4 of printed paper wrapper.
500 $a"Prepared for the Office of the Secretary of Defense."--Title page.
500 $a"National Defense Research Institute."--Title page.
500 $a"Approved for public release; distribution unlimited."--Title page.
500 $aVolumes 1-2 have base title: Root cause analyses of Nunn-McCurdy breaches.
504 $aIncludes bibliographical references (pages 109-112).
520 3 $a"The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform (WNW) and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have repeatedly exceeded certain cost thresholds. The first study compares differences in system designs, technical requirements, intellectual property protection schemes, and cost in the development of WNW. It also examined how technical risks and challenging requirements contributed to schedule and cost increases. The second study attempts to identify unique characteristics of programs that overrun their budgets more than once."--"Abstract" on web page.
610 10 $aUnited States.$bDepartment of Defense$xProcurement$xCosts.
610 10 $aUnited States.$bDepartment of Defense$xAppropriations and expenditures.
651 0 $aUnited States$xArmed Forces$xWeapons systems$xCosts.
651 0 $aUnited States$xArmed Forces$xEquipment$xCosts.
650 0 $aGovernment purchasing$zUnited States.
650 0 $aDefense contracts$zUnited States.
700 1 $aArena, Mark V.,$eauthor.
700 1 $aBlickstein, Irv,$d1939-$eauthor.
700 1 $aGonzales, Daniel,$d1956-$eauthor.
700 1 $aHarting, Sarah,$eauthor.
700 1 $aLewis, Jennifer Lamping,$d1976-$eauthor.
700 1 $aMcGee, Michael$c(Policy analyst),$eauthor.
700 1 $aMcKernan, Megan,$eauthor.
700 1 $aNemfakos, Charles,$eauthor.
700 1 $aOsburg, Jan,$eauthor.
700 1 $aRudavsky, Rena,$eauthor.
700 1 $aSollinger, Jerry M.,$eauthor.
710 2 $aRand Corporation,$eissuing body.
710 2 $aNational Defense Research Institute (U.S.),$eresearcher.
710 1 $aUnited States.$bDepartment of Defense.$bOffice of the Secretary of Defense,$esponsoring body.
740 0 $aRoot cause analyses of Nunn-McCurdy breaches.
988 $a20140926
049 $aKSGG
906 $0OCLC