Professional Documents
Culture Documents
1, 1995 79
~~ ~ ~
W. Bradford Ashton
Senior Program Manager, Battelle, Pacific Northwest Laboratories,
Washington, DC 20024-21 15 USA
Gary S. Stacey
Senior Economist, Battelle Geneva Laboratories, CH-1227 Carouge-
Geneve, Switzerland
Abstract: In this age of rapid technological innovation, firms that do not stay
abreast of the latest advancements in science and technology (S&T) stand a
greater chance of missing opportunities than firms that maintain vigilance over
the ever-changing technical environment. As a result, a resurgence of interest in
technical intelligence for business is occurring in companies around the globe.
Many firms now have formal technical intelligence programs to gather, analyze
and use S&T information to watch their competitors, to track emerging trends
in technological development and to anticipate significant technology-based
changes in key markets. Careful management of technical information that
affects a business can have a vital influence on corporate profitability and long-
term health. This paper describes the main features of technical intelligence
operations in business, drawing on the experience of several companies that
develop and use intelligence information. The steps of gathering, analyzing,
evaluating and using information for business decisions are described and
examples are given to illustrate how intelligence concepts are implemented in
firms from several different industries. Practical issues such as understanding
user needs, data collection, effective analysis methods and using intelligence
results are covered in the paper.
Reference to this paper should be made as follows: Ashton, W.B. and Stacey,
G.S. (1995) ‘Technical intelligence in business: understanding technology
threats and opportunities’ Int. J. Technology Management, Special Issue on the
Management of Technological Flows Across Industrial Boundaries, Vol. 10,
NO. 1, pp.79-104.
Dr. Stacey has been the director of various technology management and
forecasting programs at Battelle for more than 20 years. His scope is
international including projects in the USA, Europe and Japan. With a
background in economics, Dr. Stacey has extensive practical experience in
technology investment decisions, futures analysis, and various corporate policy
analyses. He has made important analysis contributions to use of scenarios for
corporate technology forecasting and valuation of intellectual property. Dr.
Stacey has authored a wide variety of strategic technology planning
publications.
1 Introduction
It has become increasingly important for most firms, especially those emphasizing
technology-based competitive advantages, to stay abreast of technical developments that
might affect them and to be alert for opportunities to exploit external technology. The
rapid pace of technological change in many industries, as well as the escalating costs of
research and development (R&D), make it imperative that firms take advantage of current
information regarding technical activities around the world. Keeping technically informed
is valuable because many business failures result from rapidly implemented new
technologies that unseat current products or outperform current production processes.
Unfortunately for incumbents, technological moves by competitors often come with little
warning. In the copier industry of the early 1980s, Xerox unexpectedly lost substantial
market share and financial resources to the low-cost, high-performance copier technology
offered by Japanese competitors like Ricoh and Canon.
Technological surprises and lost opportunities are an inevitable part of business, but
much can be done to minimize their occurrence and adverse effects. An effective science
and technology (S&T) intelligence effort might have prevented or mitigated severe losses
in many cases and provided new business opportunities in others. Technical intelligence
efforts in business do exist, and some of them have provided benefits many times over. In
Japan, prominent firms in industries that reached global prominence in the ‘70s and ‘80s
are considered world leaders for their success in technology surveillance, acquisition and
adaptation [ 11. Obtaining research and technology from external sources, the same
strategy used by many American firms when Europe was technologically pre-eminent in
the early 1900s, has been at the heart of Japan’s economic successes. Japanese engineers
regularly attend technical academic conferences in the USA and Europe, collecting
information, contacts and research papers. They tour laboratories, factories and plants and
increasingly are setting up laboratories in the USA and sponsoring university research. In
April 1990, for example, Hitachi Chemical Company opened a widely publicized $20
million research facility at the University of California at Irvine to conduct research in
biochemistry and bioelectronics. Moreover, in the past several years, Japanese firms have
been investing in startups, signing joint ventures, and licensing new technologies in
industrializing countries around the world [2].
This paper discusses the emerging area of competitive technical or S&T intelligence
for business as carried out by many firms. A well-known problem facing decision makers
is how and where to obtain S&T information to carefully address technology decisions;
however, the ‘information explosion’ prevalent today has given rise to the more urgent
problem of determining which portions of the vast amounts of available information are
Technical intelligence in business: understanding threats & opportunities 81
relevant, current and accurate. S&T or technical intelligence refers broadly to the practice
of finding, analyzing and using the best information on technical developments, events
and trends. This paper describes how successful business technical intelligence programs
can help provide and apply this key information in companies, thereby helping to ensure
long-term business success.
and more companies become proficient at technological innovation. In fact, these external
sources are often from industries other than those where a firm competes. Highly
innovative solutions to technical problems often come from adapting the technology of
unexpected sources. And, according to this and other studies, companies in the USA and
elsewhere are beginning to pay more attention to these external developments. The
implication of this trend is that effective management of both internal and external
technical information by companies is becoming vital for business success.
Since the mid-l980s, the field of ‘competitive intelligence’ has increased in size,
visibility and importance in professional and business circles. A prominent business
competitive intelligence organization in the USA, the Society of Competitive Intelligence
Professionals (SCIP), was started in 1986 and now has more than 2000 members. It has
recently initiated chapters in Europe and Japan. Many firms have established business
intelligence organizations and heightened their reliance on existing intelligence units.
And technical intelligence is now beginning to be recognized as an important component
of overall business intelligence activities [ 5 ] .
organization. Technical surveillance requires people with a broad range of interests (not
necessarily deep knowledge) and high lateral thinking skills. Such individuals can often
imagine how a change in a relatively unknown or obscure (to the people in the business)
science or technology could affect business success. Frequently, scanning identifies
subjects that are then examined in more depth in monitoring or assessment efforts.
S&T monitoring is a narrow and detailed surveillance that regularly keeps track of
changes in designated technical areas. Successful monitoring does not provide a steady
flow of information but instead, highlights key events and changes in the form of 'red
flags' that are discerned from a larger amount of routinely collected data. Technical
monitoring often produces a repository of information about continuous changes to serve
as a resource base for assessments, while monitoring system users are informed only
about changes that warrant special attention. Thus monitoring provides the basis for
alerting users to developments and emerging trends in predefined areas. This requirement
means that monitoring staff must be sensitive to the implications of the observations
obtained and be effective in disseminating information.
Assessment involves in-depth and focussed analysis of a particular technical area or
topic, often done in preparation for company business moves or investments involving
The technology intelligence activities covered in this paper do not include any illegal or
unethical activities such as industrial espionage [8]. Competitive technical intelligence is
not spying. Virtually all useful business intelligence is based on information that can be
obtained from public sources using legal and ethical means. These sources do not include
property such as trade secrets or protected materials obtained by illegally covert, intrusive
methods. In the long run, successful intelligence practices depend much more on knowing
what information is relevant, where to find it legally and how to convert it into
intelligence that serves as a real basis for managerial decisions and action.
Identify potential technological threats which can cost market share and harm
long-term business health
Knowledge of external technical activities makes it possible for firms to identify potential
technological threats that can cost them market share in existing or planned product lines.
In the 1970s, Whirlpool Corporation monitored developments in the chemical and textile
industries, where it learned about the recent innovations in the area of permanent press
fabrics prior to their commercialization. Using this information, Whirlpool was able to
produce the first washer and dryer with permanent press cycles, beating competitors by
about a year and cornering a large share of the appliance market. Thus, through its
monitoring efforts, Whirlpool was able to turn a potential threat into a major
technological coup [9]. On the other hand, the history of National Cash Register (NCR)
during the 1970s is not as bright. NCR failed to recognize the technological limits of
electro-mechanical cash registers and made large investments to improve existing product
lines in the face of emerging competition from computer-based cash registers. The
computerized systems filled cash register functions well, but also introduced real-time
information processing to automatically update shelf stock and inventory records as well
as to speed up future order planning - all immediately as sales were made. NCR’s
investors lost millions of dollars and large numbers of NCR managers and staff lost their
jobs, in large part because the company failed to keep abreast of competing technology
developments that rapidly outdated their main products.
Fanuc company spun off from Fujitsu in 1972, the company analyzed the computerized
numerical controller market to determine opportunities for market share. At that time, the
Massachusetts Institute of Technology’s (MIT) numerical controller, invented in 1952,
was still state-of-the-art. With 2,000 mechanical valves, the MIT’s device was technically
extremely complex. In addition, it was large and very expensive to purchase and operate.
Consequently, many small- and mid-sized firms could neither master it technically nor
afford it. Fanuc thus targeted this niche and developed a controller that was technically
less sophisticated, as well as cheaper and smaller than the then-current generation [12].
- methods
..........................
Technical intelligence planning proceeds at two levels. The first level involves identifying
the key needs of potential intelligence users. Successful needs assessment usually
involves a series of direct interactions with potential users of intelligence products. These
meetings should be designed to cover questions such as the type of information sought,
the level of detail, potential uses of the information and possible sources. It is also useful
to identify some of the underlying concerns or issues that drive specific user information
requests, including the sensitivity or type of protection relevant to the driving concerns.
Sometimes users are not able to specify their own needs well in early monitoring
meetings, making follow-up discussions and trial information products essential to
developing a final set of clear needs.
The second level of initial S&T information planning addresses what technical areas
to investigate. This means identifying technical areas that are critical to the long-term
success of the organization, often referred to as ‘core competences’ . In the S&T context,
a program of technical intelligence is built around ‘core technical competences’. The core
technical competence areas of a company can be identified by a series of tests that
include, for example, frequency of a technology’s use across product lines, contribution
of a technology to the organizational ‘value added’, role of a technology in customer
satisfaction, contribution to business volume or market share, or contribution to special
intellectual property positions.
Selection of five or ten such areas for a company is essential for establishing
workable technical domains for information gathering. Our experience shows that these
areas are not usually well defined or widely known within companies. There can be
90 W.B. Ashton and G.S. Stacey
considerable debate or dissention about which of many technical areas are most
appropriate or relevant. However, once established, the information sought can be used to
create opportunities to extend or enhance basic strengths in a core technical competence.
The ideal intelligence plan is effective in both assembling information and evolving to
meet the continuously changing needs of management, management style, culture, the
changing business situation, and perhaps most importantly, the changing technology and
science environment.
Once user needs and core technical competencies have been identified, an intelligence
strategy and specific activities can be established. This activity plan is important to
manage the collection, analysis and dissemination efforts. Undoubtedly, the range of
subjects and areas of interest to users will be extensive - too vast to cover with limited
resources. Thus, a collection and analysis plan is developed by selecting technical areas
to follow, deciding how to scan or monitor them, identifying general S&T information
targets, selecting sources of information, and organizing the intelligence staff in terms of
budget, staff time commitments and tasks.
The choice of sources for a technology intelligence effort depends on a variety of factors,
including the technical area involved, user needs, level of funding available and the level
of effort to be applied to the project. Sources can be internal or external to the company,
formal or informal, personal or electronic. It is important to be clear that technical
intelligence efforts should not involve any illegal or unethical activities such as those
considered to be industrial espionage. Many very effective intelligence programs in
companies have recognized that all the information required can be obtained in the public
domain. The secret of the most successful programs lies primarily in narrowing down
what information is relevant, identifying where to find it and knowing how to analyze and
convert it into intelligence that can be used as a basis for managerial decision making and
action.
Table 4 summarizes the major types of information sources on international
technology developments and trends. These sources are grouped into four major
categories that differ in terms of information content provided, overall value to various
users and cost of access. The sources are shown in decreasing order of both information
content and corresponding cost. Each category is summarized below.
Field Observations - The highest quality data regarding technical matters is obtained
from directly observing components, equipment or systems in operation or tests; this
first-hand data is generally also the most expensive because it involves travel and
significant time commitments by key program staff. Field observations include the
practice of evaluating technology through ‘reverse engineering’, or disassembly for
purposes of assessing technical and operating characteristics.
Individual Experts- The second most reliable source is personal contacts with
individuals having direct or immediate connections to the technology areas sought,
including hiring knowledgeable individuals as staff. Examples of these contacts are
technical consultants, ‘referral’ contacts, informal professional acquaintances, and
colleagues working with related firms, occasjonally even competitor firms [151.
Attendance at trade shows, conferences, etc., creates opportunities for contact with
personnel who are directly involved with the work. Since travel to external sites is
Technical intelligence in business: understanding threats & opportunities 91
often necessary to make contacts, this can also be expensive. However, developing
primary expert contacts offers the advantage of potentially long-term access to
information, if a solid professional relationship has been established.
Technical and Business Literature - Literature, both published and unpublished, is an
excellent source for certain kinds of data; technically detailed information is usually
best obtained from documents. In just one example, Intel monitors scientific
FIELD OBSERVATIONS
first-hand technology system examinations or tests; e.g. reverse engineering
onsite installations
short-term onsite personnel assignments, visits or tours
INDIVIDUAL EXPERTS
professional relationships with individuals having immediate connections with
technology
- short-term interviews
- long-term collaborations
for success. Each of these candidates makes a more detailed presentation of their ideas,
and Olivetti chooses a winner. For the winner, development support is offered in
exchange for compensation, often including a degree of ownership in the small company
by Olivetti. By this means, Olivetti is able to survey the scientific and technical
developments related to its products and processes and, at the same time, take partial
ownership of the attractive developments at an early stage [17].
The significant advantage in this approach is the fact that the company extends its
intelligence gathering beyond its own internal capabilities. It is as though the company
were writing a functional or performance specification for its products - what services do
they deliver and how can these services be delivered in another way. By asking for ideas
from outside, the company substantially widens the potential range of technology and
science alternatives that can provide solutions.
Methods of gaining access to technological information that require significant
financial investment include sponsoring university research, sponsoring endowed chairs
at universities, acquiring small high-tech firms, and locating laboratories domestically or
overseas where competitors are active. By sponsoring computer research at universities,
Digital Equipment Corporation (DEC) maintains access to major research developments
and leading scientists who perform research of interest to the company. As of 1990, DEC
sponsored more than 240 projects at over 100 universities around the world [18].
Similarly, in 1988, Fujitsu Limited, Japan’s largest computer maker and one of the
world’s largest manufacturers of telecommunications equipment, gave a $1.5 million
grant to MIT to establish the Fujitsu Professorship of Electrical Engineering and
Computer Science. As a result, the company benefited from the results of MIT’s research
in that field [ 191.
Kodak, recognizing the need to learn about the technology of its Japanese
competitors, opened a facility in Japan in 1987. The head of Kodak’s Japanese operations
states that it is easier to collect information on Japan inside the country, since both the
popular and trade presses can obtain write-ups on new technological developments faster
and more consistently than American companies do. In addition, staff are able to pick up
useful information from previous employers, customers and competitors, or while
socializing [20].
Another method organizations use €or technology intelligence is hiring consultants to
collect, develop or evaluate information, rather than creating a program in-house.
Japanese firms have a particularly sophisticated network for technology monitoring in
their extensive use of trading companies, called sogo shoshas. These companies provide
volumes of information to their clients. Information-gatherers at the sogo shosha are
stationed in 180 overseas offices. They send as many as 100,000 pieces of information
daily back to the home office, where it is analyzed and put into a mainframe computer as
part of a larger database [21].
actions. The approaches, tools and techniques used for analysis depend on the
characteristics of the source material, the questions at hand and the user needs addressed.
Analysis gives context to the data and develops specific intelligence findings and
recommendations for distribution to users.
The analysis activity is the most difficult intelligence effort to describe. There are few
standard ways to perform analysis, and a wide range of approaches and tools to assist the
process. However, the general issues addressed by the analysis process can be described.
Intelligence analysis can be divided into two basic categories: technology-focussed and
company focussed.
Technology-focussed (product and process) analysis attempts to:
provide technical descriptions of existing or emerging technology systems,
developments, events, trends or capabilities; e.g., developing a technical brief on
applications of fuzzy logic to process or equipment control
identify or predict significant shifts in the rate of progress in an area or the
occurrence of technical breakthroughs that will make a new capability technically or
economically feasible; e.g. describing the impacts of high temperature
superconductivity for advances in scientific instrumentation
identify when substitute or competing technologies for a firm’s products or processes
are becoming available; e.g. recognizing the potential for composite materials to
substitute for metallic components
assess the responses of other firms to new market-influencing technology forces such
as government regulatory actions or structural shifts in consumer preferences; e.g.,
assessing the implications for competitor’s product strategies of new federal rules to
control toxic emissions.
Company-focussed analysis attempts to:
recognize patterns of activity by competitors, suppliers or customers that can have
potential consequences for a firm’s market relationships; examples include formation
of joint ventures between competitors, customers or suppliers; university research
program developments; issuance of patents or licenses; announcements of new R&P
contracts; or new high technology product releases
identify emerging capabilities (new distinctive technical competences) or strengths
and weaknesses in a competitor, supplier or customer that could affect a firm’s
business; e.g. recognizing that a competitor has the capability for recycling and
selling materials formerly handled as waste products for disposal
compare the technical state-of-the-art between external and company product lines or
process methods; e.g. finding a means of chemically treating the surface of a product
that could be adopted in place of widely-used mechanical polishing equipment
compare current product or process technology performance or cost data with past
records to discern trends that may be important in the future; e.g. comparing the
technical performance and cost of new modular manufacturing techniques against
older batch processing methods
Technical intelligence in business: understanding threats & opportunities 95
Periodically, the intelligence process and results should be evaluated with regard to
whether they serve user needs and ultimately have beneficial impacts on the organization.
The purpose of the evaluation is to improve future operations by making them more
responsive to company needs, to further clarify those needs and to adjust practices
accordingly. These evaluations can be either quick and informal, often in connection with
a particular situation being studied, or in-depth. and structured, where an entire
intelligence program is periodically evaluated before decisions regarding continued
support are made. Intelligence program evaluation involves comparing yardsticks of the
program?s performance against the resources and management decisions to meet the
program’s activities.
These six steps form the basis for technical intelligence staff support functions,
usually comprising part of an organization’s information management infrastructure.
Other information components include the corporate library, information
centre/management information system (MIS) and market research group or strategic
planning functions. Although these steps may not always be discernible as individual
steps in the organizational environment, each of them has been found to be important in
successful business intelligence efforts.
Although most companies that rely heavily on technology for competitive advantage
could benefit from some form of intelligence activity, certain types of companies have a
strong need for technical intelligence and would gain substantially from using it. These
companies typically have some of the following characteristics:
a technologically dynamic industry environment
- the pace of technological change in the industry is rapid
- entirely new or different technologies are likely to be needed within five years
9 technology-intensive products and processes
- technology is an important differentiating factor in product features or pricing
strategy
- the rate of new product introduction is high
- market entry timing is important to the success of the business
- regulatory approval of new products is complex, time-consuming and costly
98 W.B. Ashton and G.S. Stacey
Central Unit - Establish a core monitoring unit with dedicated staff and a specific
assignment for technological monitoring.
Existing Group - Include monitoring responsibility within an existing group
function, such as corporate planning, R&D or marketing.
Decentralized - Distribute monitoring responsibility to the operating units of the
company along with other planning functions.
Diffused - Do not establish a formal structure for monitoring, but ensure it is
performed by staff throughout the company as part of their other job responsibilities.
None - Do not devote attention to monitoring the technological environment, and do
not establish institutional arrangements for performing the task.
As shown in Table 5, the study found that the incidence and organizational location of
technological monitoring is related to the product strategy and attitude toward technology
threats in the companies surveyed. Firms with a diversified product mix (multiple
products and business units) tended to use a decentralized or diffused organizational form
for monitoring or had no monitoring at all. There was a clear tendency for the non-
diversified companies to rely on some centralized form for technological monitoring,
either a central unit or an existing group. Seven out of nine (78%) non-diversified
companies used a centralized structure, compared with only five out of twenty-two (23%)
diversified firms. Virtually all of these firms were concerned about competitive
technology developments.
Three types of attitudes toward technology were investigated. The aggressive attitude
included companies where technological innovation was essential to the company's
future. They accept that product substitution will take place, so they seek to have a
continual stream of new products coming on to the market. The concerned outlook was
represented by firms that paid attention to the threat from technological developments,
but which for some reason do not feel challenged to constantly develop new products
themselves. Finally, the complacent firms are those that do not consider technological
change to be a potential threat to their business. The key to their business future is the
nature of product demand, not the product’s technical characteristics. As the table
indicates, eight companies undertook no monitoring, and all but one of these had a
complacent attitude toward technology.
For this system to be a success, it is essential that the company staff who contribute
data have the experience of seeing that their inputs are useful. This requires feedback
about the utility and ultimate impact of the data provided from the field. To this end, the
core unit manager makes regular, personal, on-site contacts with the outlying business
elements. In addition to coordination activities and some training, these contacts reinforce
the motivation of the gathering sites about the value of their efforts. In addition, as the list
of critical subjects is in continuous evolution, the new subjects are introduced and the
means of obtaining information about these subjects can be suggested and discussed.
This company organization serves as a system for ‘weak signal processing’. That is, it
picks up seemingly minor facts, conversations, news items, occurrences or other data,
which can be thought of as ‘weak signals’ since their relation to other signals is unknown
and their significance to company decisions has not been established. The weak signals
are passed to the central location where they can be checked, reviewed and combined
with other data to possibly form a key intelligence finding. At this company, this
approach has been very effective in identifying upcoming events, technical developments
and other significant changes on critical issues at an early stage, often well in advance of
appearance of relevant items in the scientific and technical literature.
7 Conclusion
This article summarizes the main features of S&T intelligence programs in business and
shows that S&T intelligence represents an essential means by which businesses can take
advantage of technological advances internationally as well as in their own countries.
Effective intelligence activities have helped firms respond to competitors’ moves, take
advantage of technical advances or breakthroughs by others, avoid duplicative R&D and
enhance overall business competitiveness.
Recent trends, including rising R&D costs, continued reductions in product cycle
times and increasing numbers of high technology firms, all suggest that the use of S&T
intelligence is likely to grow for many companies around the world.
Technical intelligence in business: understanding threats & opportunities 103
22 See ‘Digital and the research community: partners in technological change’, (1987). Digital
Equipment Corporation, Hudson, MA; D.M.A. Rogers. 1987. ‘Progressive transfer policies:
advancing the frontiers of technology’, presentation to the Second International Technical
Innovation and Entrepreneurship Conference, Birmingham, England.
23 For an example of company security efforts at Apple Computer, see Ohljausen, P. May 1989.
Security Management, American Society for Industrial Security, Arlington, VA.
24 See Quinn, J.J. (1985) ‘How companies keep abreast of technological change?’ Long Range
Planning, 18(2), pp.69-76.
25 Op cit, Ref 17.