Boeing Lockheed Martin Lrs B Case Study

Strategic Alliance There are a number of reasons why companies engage in strategic alliances. Typically, these are rooted in the idea of comparative advantage, where the two companies bring their respective strengths to the project, theoretically these strengths complementing each other. There are some industries where the practice is quite common, in particular pharmaceuticals and defense. Indeed, in some of these industries, companies can have multiple strategic alliances at any given time. A good example of this is Boeing and Lockheed Martin, both defense contractors with expertise in aerospace. They have collaborated on an air transportation system for the commercial air industry (Boeing, 2007), and on jet fighters for the Department of Defense (Thompson, 2013). This paper will focus on the latter as the strategic alliance to be discussed. Ultimately, the long-range bomber project failed for the alliance, which actually highlights one of the major reasons why such alliances are common in the defense industry.

Company Histories

Boeing started as an aircraft producer for private use, and quickly became a supplier of aircraft for some of the world's first commercial airlines. By the Second World War, Boeing moved into military aircraft production, and it retained that position after the war. The Department of Defense typically wants to see competition so it ensures that all of its major defense contractors have enough business to survive. This is one of the reasons why Boeing was able to carve out a business as one of the handful of aerospace providers to the DoD. Boeing's defense business is today worth revenues of $30.9 billion, delivering 179 military aircraft, five satellites and 10,998 weapons systems. The company has a backlog of $62 billion in its defense business, spanning from those products to spacecraft and weapons. The company's...

...

It also sells to key allies, such as Japan, and has developed a Global Missile Defense System.
Lockheed Martin is primarily a defense contractor, worth $45.6 billion in annual revenue. It competes in many of the same segments as Boeing. One of its flagship products is the F-35 Lightning fighter jet, and it delivered 36 of these in 2014. It also sells to key allies, such as South Korea and Australia. LM also produces vessels for the U.S. Navy, has a cyber security business, works on commercial aviation management systems and has an IT business.

Prior History

As noted, Boeing and Lockheed Martin work together frequently. They worked together to promote a civil aviation management system as an upgrade on the current system. Both companies worked together on the Delta IV rockets that launched the Orion probe to Mars. On the project in question, the Department of Defense had put out bidding for a long-range bomber, the first such project of its kind in 30 years. There were two bids, from Boeing/Lockheed Martin and from Northrup-Grumman.

Long-Range Bomber

In the long-range bomber, Boeing was the primary contract and Lockheed the primary teammate. The objective of the strategic alliance was to win the bid for the bomber, said to be the largest military aircraft contract in over a decade (Seligman, Clevenger & Mehta, 2015). Observers felt that one of the reasons Boeing and Lockheed needed to partner is because Northrup Grumman had significant advantages in winning a bomber contract. Northrup had won the contract for the B-2 Spirit, the lead bomber in the Air Force's fleet. Boeing clearly felt the need to overcome this experience gap by teaming with Lockheed to bring…

Sources Used in Documents:

References

Boeing. (2007) Boeing and Lockheed Martin form strategic alliance to promote next-generation air transportation system. Boeing. Retrieved November 29, 2015 from http://boeing.mediaroom.com/2007-01-22-Boeing-and-Lockheed-Martin-Form-Strategic-Alliance-To-Promote-Next-Generation-Air-Transportation-System

Boeing 2014 Annual Report. Retrieved November 29, 2015 from https://materials.proxyvote.com/Approved/097023/20150226/AR_235328/pubData/source/The%20Boeing%20Company%202014%20Annual%20Report.pdf

Gaughan, P. (2007). Mergers, acquisitions and corporate restructurings, fourth edition. John Wiley & Sons.

Hillis, N. (2015). USAF orders Northrup to stop work on LRS-B. Aviation Week. Retrieved November 29, 2015 from http://aviationweek.com/defense/usaf-orders-northrop-stop-work-lrs-b
Lockheed Martin 2014 Annual Report. Retrieved November 29, 2015 from http://www.lockheedmartin.com.au/content/dam/lockheed/data/corporate/documents/2014-Annual-Report.pdf
Seligman, L., Clevenger, A. & Mehta, A. (2015). Northrup Grumman wins Air Force's long-range strike bomber contract. Defense News. Retrieved November 29, 2015 from http://www.defensenews.com/story/defense/2015/10/27/northrop-grumman-wins-usaf-bomber-contract/74661394/
Sweetman, B. (2015). LRS-B: Why Northrup Grumman won next U.S. bomber. Aviation Week. Retrieved November 29, 2015 from http://aviationweek.com/defense/lrs-b-why-northrop-grumman-won-next-us-bomber
Thompson, L. (2013). Why a Boeing-Lockheed Martin long-range strike bomber team will be hard to beat. Forbes Retrieved November 29, 2015 from http://www.forbes.com/sites/lorenthompson/2013/10/29/why-a-boeing-lockheed-martin-bomber-team-will-be-hard-to-beat/


Cite this Document:

"Boeing Lockheed Martin Lrs B" (2015, November 29) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/boeing-lockheed-martin-lrs-b-2158835

"Boeing Lockheed Martin Lrs B" 29 November 2015. Web.27 April. 2024. <
https://www.paperdue.com/essay/boeing-lockheed-martin-lrs-b-2158835>

"Boeing Lockheed Martin Lrs B", 29 November 2015, Accessed.27 April. 2024,
https://www.paperdue.com/essay/boeing-lockheed-martin-lrs-b-2158835

Related Documents

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents