Technology insertion considerations for complex system of systems development
Aragon, Lasumar (Mark) R.
MetadataShow full item record
D efforts to insert new capabilities into the Current Force. Complex system of systems development, however, requires more robust approaches to ensure effective and efficient delivery of new capabilities to the warfighter such that he can immediately take advantage of the full capabilities the new system offers. Integrating a Modular Open Systems Approach to acquisition ensures the seamless insertion of newly acquired systems into existing systems and facilitates insertion of future envisioned systems. The System Structure methodology provides a framework for engineering a system and is used to integrate the evolutionary acquisition process and the modular open systems approach for a tailored framework that addresses the needs and requirements of the FCS program and contribute to Army Modernization Strategy overall. The integration of evolutionary acquisition and MOSA within a sound systems engineering framework results in an insertion strategy that is responsive and flexible with the greatest benefit to the end user of the resulting products.
Showing items related by title, author, creator and subject.
Applied Information Technology (IT) for ship design, production and lifecycle support : a total systems approach Dunlap, Gary H. (Monterey, California. Naval Postgraduate School, 1999-06-01);This thesis analyzes the material flows, manpower usage, administrative requirements and procedures, and technical interface needs employed in the logistics systems onboard aircraft carriers and submarines to determine ...
Electronic Property Modification of Single-Walled Carbon Nanotubes by Encapsulation of Sulfur-Terminated Graphene Nanoribbons Pollack, Andrew; Alnemrat, Sufian; Chamberlain, Thomas W.; Khlobystov, Andrei N.; Hooper, Joseph P.; Osswald, Sebastian (2014);The use of carbon nanotubes (CNTs) as cylindrical reactor vessels has become a viable means for synthesizing graphene nanoribbons (GNRs). While previous studies demonstrated that the size and edge structure of the ...
Rogers, David T. (Monterey, California. Naval Postgraduate School, 2003-06);The subversion technique of attacking an operating system is often overlooked in information security. Operating Systems are vulnerable throughout their lifecycle in that small artifices can be inserted into an operating ...