🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
Opportunities and Obstacles
Because license plate reader (LPR) technology is relatively new in the United States, opportunities and obstacles in its use in law enforcement are st...
Case Studies for the Acquisition Community
Through literature reviews, interviews, and case studies, researchers reviewed recent U.S. Air Force experience in using other transactions for protot...
An Implementation Guide for Process Planning and Execution
Cyber mission thread analysis (CMTA), which identifies mission-critical systems in a cyber threat environment, requires a disciplined, well-planned pr...
With Illustrations from the F-22 Product Support BCA
This document explains how to apply guidance on project evaluation to product support business case analyses in a way that allows senior Department of...
This report documents the structured process that was developed to help project teams identify acquisition framing assumptions (FAs), which are useful...
This report provides a risk assessment methodology that integrates risk factors and risk management approaches tailored to the National Aeronautics an...
Introduction and User Manual
The U.S. government has developed hundreds of approaches to promote and protect critical technologies and their associated industrial base, and the sh...
With Application to Inform Force Planning for Technological Surprise
This report describes an approach developed to elicit from experts ideas for technology-based challenges that the U.S. Joint Force could confront in t...
Military Utility, Market Dynamics, and Warfighter Adoption
The authors evaluate the possible utility of electric vertical takeoff and landing aircraft, how much influence the U.S. Air Force has on technical de...
This report presents a framework for the development of metrics-and a method for scoring them-that indicates how well a U.S. Air Force mission or syst...
This report documents the results of the project "Developing a Methodology Framework for Conducting Risk-Informed Trade Space Analyses." The primary o...
The authors offer ways to help wings assure their missions despite cyber attacks, focusing on how wings can maintain situational awareness, defend the...
This report offers a foundation for better managing, at the enterprise level in the Air Force, efforts to ensure resiliency of missions to adversarial...
This report addresses the challenges the U.S. Air Force faces in mitigating the risks associated with an increasingly globalized weapon supply chain a...
...
A Systems-Based Approach for Managers
Oversights during development of technical requirements for new weapon systems can result in cost or schedule overruns or unsuitable operational perfo...
What do experts envision as the largest technology-based challenges the U.S. Joint Force may encounter by 2040? The authors develop and implement an a...
The authors identify ways to improve the U.S. Space Force's (USSF's) capability requirements development to help USSF achieve its core mission in the ...
Researchers developed a methodology to assess the value of resource options for U.S. Navy cybersecurity investments. The proposed methodology enables ...