Fact-checked by Grok 2 weeks ago
References
-
[1]
Technology Intelligence - Institute for Manufacturing (IfM)The Centre for Technology Management has defined 'technology intelligence' as. "the capture and delivery of technological information as part of the process ...
-
[2]
[PDF] Technology Intelligence: A Powerful Tool for Competitive AdvantageFor the purposes of this discussion, technology intelligence is defined as the collection, analysis, and application of publicly available information on ...
-
[3]
Technology intelligence and technology scouting - Brenner - 1996This article describes what the author views as the differentiating characteristics of business intelligence, competitive intelligence, and technology ...<|control11|><|separator|>
-
[4]
Technology Intelligence and Digitalization in the Manufacturing ...Sep 20, 2023 · Overview: This study discusses ... The most common sources are publications and patents, where technology information is well documented.
-
[5]
[PDF] Directing the technology intelligence activity - University of CambridgeIt covers the spectrum of sources from leveraging internal information, through spanning organizational boundaries to access external sources across the ...
-
[6]
(PDF) Technology intelligence: Methods and capabilities for ...Artificial Intelligence (AI) may be defined as the science of enabling computers and machines to learn, reason and make judgments. According to Elaine Rich ...
-
[7]
Development of a maturity model for technology intelligenceAug 10, 2025 · To develop a model to measure technology intelligence capabilities, extant studies are reviewed, and interviews are conducted with eight firms.
-
[8]
An Inflection Point for Scientific and Technical IntelligenceApr 25, 2018 · S&TI examines foreign developments in basic and applied sciences and technologies with warfare potential, particularly enhancements to weapon systems.
-
[9]
Como inteligência tecnológica é aplicada?Technology Intelligence may be organized in three ways: (1) hierarchically, (2) participatory and (3) hybrid (Lichtenthaler, 2007). When the TI is organized ...
-
[10]
[PDF] Technology intelligence process in practice: building an extensive ...Jul 4, 2018 · Kerr, C.I.V., Mortara, L., Phaal, R., Probert, D.R., 2006. “A conceptual model for technology intelligence.” International. Journal of ...
-
[11]
[PDF] technology intelligence and organizational performance ofTechnology Intelligence (TI) helps companies identify tech opportunities/threats, and has a positive relationship with organizational performance. It captures ...
-
[12]
[PDF] Technology Intelligence as a One of the Key Factors for Successful ...Apr 13, 2023 · Technology Intelligence is key for strategic management in the Smart World, enabling organizations to select and evaluate valuable technologies ...<|control11|><|separator|>
-
[13]
Technology Scouting: Key Questions Answered - QmarketsOct 3, 2025 · Effective technology scouting delivers benefits such as: Faster time-to-market for new solutions; Access to validated external technologies ...
-
[14]
Technology Intelligence Guide - OVTTTechnology monitoring and intelligence tools are essential to gather, process and transform a large amount of data and information into useful knowledge for ...
-
[15]
History of technology - Greece, Rome, 500 BCE-500 CE - BritannicaSep 24, 2025 · The Romans were responsible, through the application and development of available machines, for an important technological transformation: the ...
-
[16]
Espionage in Ancient Rome - HistoryNetJun 12, 2006 · The growth of bureaucracy in the late empire created another use for spies: surveillance of other ministries of state. The central government ...
-
[17]
The British patent system during the Industrial Revolution, 1700-1852This paper revises each step of this argument, firstly by examining the legal construction of the English patent.
-
[18]
America Participates in Innovation – 1800s | LemelsonMar 25, 2016 · When the Patent Office examined new and useful ideas and granted its imprimatur, the resulting patent became a secure form of intellectual ...
-
[19]
[PDF] Schumpeter's Creative Destruction: A Review of the EvidenceSchumpeter's process of creative destruction states that technological advance is the main source of economic growth and improvements in the quality of life. It ...
-
[20]
Scientists and the Legacy of World War II: The Case of Operations ...Systems analysis after the war was applied primarily in weapons development projects undertaken under the aegis of a primary contractor - as, for example ...
-
[21]
Coordination of Technology Intelligence Processes: A Study in ...The effectiveness of technology management is fundamentally influenced by observations made about current and future technology trends.Missing: layers | Show results with:layers
-
[22]
Technology Scouting from Insight to Action - Future OrientationSep 4, 2010 · The general idea of technology scouting is simple: Use a network of experts to scan the technological environment, monitor key technologies and channel the ...<|control11|><|separator|>
-
[23]
The Logic of Open Innovation - Henry Chesbrough, 2003The Logic of Open Innovation: Managing Intellectual Property ... Artificial Intelligence in the Startup World: A Bibliometric Study of Emerging Trends and Themes.
-
[24]
The European Foresight Monitoring NetworkOct 27, 2008 · It was started in 2004 as a service to foresight practitioners and policy makers in Europe and beyond.
-
[25]
Why Silicon Valley is the Go-To Place for Artificial IntelligenceAug 3, 2023 · But it was during the 2010s that brought a shift toward AI. This came with rapid innovation due to new technologies, further unlocking the power ...
- [26]
-
[27]
[PDF] Practical Foresight Guide Chapter 4 – Scanning - Shaping TomorrowAug 3, 2013 · ❑ Adapted from The Technology Radar -an Instrument of Technology Intelligence and Innovation. Strategy, R. Rohrbeck, J. Heuer, H. Arnold ...
-
[28]
Horizon Scanning Methodology Explained - AMPLYFIAug 26, 2021 · Technology Intelligence · Account Based Marketing (ABM) · Key Account Planning · Sales Intelligence · Regulatory Intelligence · Open Source ...
-
[29]
Delphi Method - RANDThe Delphi method was developed by RAND in the 1950s to forecast the effect of technology on warfare. It has since been applied to health care, education, ...
-
[30]
[PDF] AHRQ Health Care Horizon Scanning System A Systematic Review ...For example, at the technology scanning and filtering stages, it is challenging to accurately identify the target technologies efficiently. Decisions must be ...
-
[31]
Technology roadmapping for competitive technical intelligenceIn this paper, we present a hybrid roadmapping technique that draws on a number of approaches and integrates them into a multi-level approach.Missing: prioritization | Show results with:prioritization
-
[32]
Espacenet now offers more than 150 million freely accessible patent ...Feb 7, 2024 · Our worldwide Espacenet database now offers more than 150 million patent documents, containing comprehensive data about a wealth of inventions and technical ...
- [33]
-
[34]
1120-Eighteen-Month Publication of Patent Applications - USPTOThe projected publication date normally will be the later of: (1) eighteen months from the earliest filing date claimed; or (2) fourteen weeks from the mailing ...
-
[35]
Databases and Electronic Resources - LibGuides at Cornell UniversityMar 7, 2025 · Scopus is the largest abstract and citation database of peer-reviewed literature: scientific journals, books and conference proceedings.
-
[36]
Statistics & Operations Research: ArticlesLike Web of Science, Scopus allows researchers to perform citation searches to see how many times a work has been cited, by whom, and to rank searches by ...
-
[37]
Implementing the NIST Cybersecurity Framework in the Digital ... - IDCThis module will help IT leaders focus on security priorities that deliver the largest return on effort in your program to develop digital trust.Missing: Forrester Crunchbase sources
-
[38]
[PDF] The National Institute of Science and Technology Developing a ...Apr 8, 2013 · Forrester provides broad, global, analysis and experience regarding cybersecurity coupled with a deep understanding of how changes in the IT ...
-
[39]
Best Predictive Intelligence Software in 2025 - CrunchbaseAug 28, 2025 · Discover the top predictive intelligence software and tools, from Crunchbase to IBM to Google. Compare features from these industry leaders.Missing: IDC Forrester NIST
-
[40]
From Social Media to the Dark Web: How AI in OSINT is ...Oct 26, 2024 · Social media is a rich source of threat intelligence, providing insights into emerging threats, hacker activities, and public sentiment.
- [41]
-
[42]
Patent Analytics & IP Intelligence Platform - PatsnapTransform patent data into actionable insights with Patsnap's AI-driven IP analytics. Access 202M+ patents, run prior art & FTO searches, and gain ...
-
[43]
Top 7 Patent Analysis Tools for 2025 - Solve IntelligenceAug 10, 2025 · Advanced Search Options: PatSnap provides versatile search tools, from quick semantic searches to detailed Freedom-to-Operate (FTO) analyses. AI ...
-
[44]
Derwent Data Analyzer - Patent Data Analyzer - ClarivateDerwent Data Analyzer is a desktop data-mining platform that converts patent data, scientific literature and your own business intelligence into actionable, ...
-
[45]
Derwent Innovation Patent Search Software - ClarivateDerwent Innovation patent search software helps patent professionals make faster, more confident patentability, freedom-to-operate (FTO) and validity decisions.Missing: visualization | Show results with:visualization
-
[46]
Big Data in Tableau: Faster insights with visual analyticsTableau makes sense of Big Data. Get faster insights, quicker analysis, and advanced visualizations to communicate complex data. See how.
-
[47]
Apache HadoopThe Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple ...Download · Setting up a Single Node Cluster · Apache Hadoop 3.1.1 · Hadoop 2.7.2Missing: scouting | Show results with:scouting
-
[48]
What is Hadoop? - Apache Hadoop Explained - AWSApache Hadoop is an open source framework that is used to efficiently store and process large datasets ranging in size from gigabytes to petabytes of data.
-
[49]
What is Machine Learning? | IBMMachine learning is the subset of AI focused on algorithms that analyze and “learn” the patterns of training data in order to make accurate inferences about ...What Is Deep Learning? · Artificial intelligence (AI) · Vs. Neural Networks · Courses
-
[50]
How to Use IBM Watson for Business Analytics - VerpexApr 10, 2025 · Learn how to use IBM Watson for business analytics and insights. Discover its AI-powered capabilities to analyze data, predict trends, ...What Is Ibm Watson? · Overview Of Watson's... · Preparing Your Data<|separator|>
-
[51]
curve_fit — SciPy v1.16.2 Manualcurve_fit is for local optimization of parameters to minimize the sum of squares of residuals. For global optimization, other choices of objective function, and ...Curve_fit · Least_squares · Bounds · 1.13.0
-
[52]
SAP Innovation Management | LeverXRating 4.9 (114) SAP Innovation Management is an SAP module developed based on the SAP HANA platform. It helps businesses build a creative environment within a single platform.
-
[53]
SAP Basis Case Study On Upgrading SAP S/4HANA System - LMTEQOverall, operational costs were reduced by 20%, user productivity increased by 30%, and customer satisfaction improved by 25%, positioning the system for future ...<|separator|>
-
[54]
SAP Implementation Cost Breakdown: Why Budgets Explode 50%Apr 6, 2025 · Most SAP implementations go over budget. And not by 5 or 10 percent. In projects I've reviewed, overruns of 40% to 60% are common.S/4hana Vs Traditional Sap... · Sap Vs Oracle: Which Erp Is... · Real Sap Project Cost...
-
[55]
How Much Does SAP Implementation Cost? A Complete BreakdownMay 23, 2025 · SAP consultants typically charge between $75 and $300 per hour, based on experience, location, and project scope. Project managers and SAP ...
-
[56]
Evaluate New Technologies with the Best Technology Scouting ...For example, Google acquired DeepMind, an artificial intelligence (AI) company, to enhance its own AI capabilities and applications. However, technology ...Missing: acquisitions | Show results with:acquisitions
-
[57]
Technology Scouting and Its Relevance for Businesses - Sagacious IPTechnology scouting is a well-known component of competitive intelligence, which businesses leverage as a tool for their competitive strategy.
-
[58]
Optimizing Automotive Supply Chains with Data IntelligenceApr 11, 2025 · You're ready to adapt to a new emissions regulation, manage the shift to EV components, or deal with global supply chain instability. The ...
-
[59]
Electric vehicles and the impact on the automotive supply chain - PwCPwC analysis shows that EVs may represent approximately 14% global new vehicle sales in Europe and China by 2025 -- up from 1% in 2017.Missing: monitoring | Show results with:monitoring<|separator|>
-
[60]
Data and AI are Helping to Get Medicines to Patients Faster - PfizerData, Artificial Intelligence (AI), and supercomputing are accelerating innovation across Pfizer—from discovery to clinical development, manufacturing ...
-
[61]
The next innovation revolution—powered by AI - McKinseyJun 20, 2025 · AI isn't just for efficiency anymore. It can double the pace of R&D to unlock up to half a trillion dollars in value annually.Missing: 2020s | Show results with:2020s
-
[62]
New Accenture Research Finds that Companies with AI-Led ...Oct 10, 2024 · Compared to peers, these organizations achieve 2.5x higher revenue growth, 2.4x greater productivity and 3.3x greater success at scaling ...Missing: 2020s | Show results with:2020s
-
[63]
How Close Is the Transformational AI Wave?Apr 2, 2024 · Company anecdotes report similar productivity gains ranging from 15-46 percent, with a median boost of 25 percent and an average of 26 percent.
-
[64]
HAWC: Hypersonic Air-breathing Weapon Concept - DARPAThe Hypersonic Air-breathing Weapon Concept (HAWC) program is a joint DARPA/U.S. Air Force (USAF) effort that seeks to develop and demonstrate critical ...
-
[65]
DARPA Starts Work On "Glide Breaker" Hypersonic Weapons ...Jul 27, 2019 · The program's main goal is to find ways to make America's enemies think twice before using hypersonic weapons.
-
[66]
Threat Intelligence & Assessments - National Security AgencyThreat Intelligence & Assessments NSA keeps you aware of evolving cyber threats by offering the following downloadable products.
-
[67]
[PDF] Annual Threat Assessment of the U.S. Intelligence CommunityMar 18, 2025 · This report assesses threats to US national security, including nonstate transnational criminals, terrorists, and major state actors like China ...
-
[68]
Strategic plan - Research and innovation - European CommissionThe strategic plan sets out 3 strategic orientations for research and innovation investment under Horizon Europe for the years 2025-2027.
-
[69]
EC publishes 2025 Strategic Foresight Report - ERA Portal AustriaSep 10, 2025 · The 2025 report identifies eight areas of action where Europe can strengthen its resilience, including research and technology as one of them:.
-
[70]
Is 'Made in China 2025' a Threat to Global Trade?The Chinese government has launched “Made in China 2025,” a state-led industrial policy that seeks to make China dominant in global high-tech manufacturing.What is China 2025? · How does it fit into China's... · What are the criticisms of...
-
[71]
Was Made in China 2025 Successful? - Rhodium GroupMay 5, 2025 · The policy aimed to reduce the country's reliance on foreign technology, enhance domestic innovation, and build global competitiveness and ...
-
[72]
The Wassenaar Arrangement: HomeThe Wassenaar Arrangement has been established in order to contribute to regional and international security and stability.Control lists · English · About us · National ContactsMissing: intelligence | Show results with:intelligence
-
[73]
[PDF] List of Dual-Use Goods and Technologies and Munitions ListThe export of "technology" which is "required" for the "development", "production" or "use" of items controlled in the Dual-Use List is controlled ...
-
[74]
Conventional Dual-Use Technology Controls - State DepartmentIntelligence and Research ... Wassenaar Arrangement, the 42-member multilateral export control regime for conventional weapons and advanced technologies.
-
[75]
Chapter 16: Innovation, technology development and transferThis section covers international transfer and cooperation in relation to climate-related technologies, 'the flows of know-how, experience and equipment for ...
-
[76]
[PDF] The Climate Technology Progress Report 2024 - UNFCCCThe term encompasses both the diffusion of technologies and technological cooperation across and within countries (IPCC 2022a).
-
[77]
[PDF] Data Age 2025: - Seagate TechnologyBy 2025, the global datasphere will grow to 163 zettabytes, with real-time data increasing, and AI systems will be a key trend.
-
[78]
Big Data Statistics 2025 (Growth & Market Data) - DemandSageJun 24, 2025 · In 2025, the world will generate 181 zettabytes of data, an increase of 23.13% YoY, with 2.5 quintillion bytes created daily.Missing: reliable | Show results with:reliable
-
[79]
The challenge of information overload - IEEE XploreInformation overload is one of the greatest challenges to individuals and organizations today. It affects productivity and therefore significantly impacts ...
-
[80]
Causes, consequences, and strategies to deal with information ...Strategies for managing information overload include learning multiple skills and using filtering, prioritizing, and technology tools. This article provides a ...
-
[81]
What challenges and growth opportunities do you predict for SMEs ...Jan 7, 2025 · Resource constraints. Limited budgets and a shortage of skilled IT professionals make it challenging for SMEs to adopt advanced technologies.
-
[82]
There's More to AI Bias Than Biased Data, NIST Report HighlightsMar 16, 2022 · Bias in AI can harm humans. AI can make decisions that affect whether a person is admitted into a school, authorized for a bank loan or accepted ...
-
[83]
Busting the Blockchain Hype: How to Tell if Distributed Ledger ...Apr 23, 2018 · “This framework cuts through the noise about blockchain and refocuses the technology into the way business leaders think,” said Jennifer Zhu ...
-
[84]
Paywalls are Not the Only Barriers to Access - The Scholarly KitchenNov 7, 2024 · Content that is inaccessible is no more open to those who need supportive reading functionality than content that is behind a paywall.
-
[85]
U.S.-China Technological “Decoupling”: A Strategy and Policy ...Apr 25, 2022 · A partial “decoupling” of U.S. and Chinese technology ecosystems is well underway. Without a clear strategy, Washington risks doing too ...Missing: paywalls | Show results with:paywalls
-
[86]
The state of AI in 2023: Generative AI's breakout year | McKinseyAug 1, 2023 · The latest annual McKinsey Global Survey on the current state of AI confirms the explosive growth of generative AI (gen AI) tools.
-
[87]
What's New in Artificial Intelligence From the 2023 Gartner Hype ...Aug 17, 2023 · Generative AI is dominating discussions on AI, having increased productivity for developers and knowledge workers in very real ways, using ...
-
[88]
Grok | xAIA trusted assistant for deep work. Grok can create rich documents, write code, and has the most real-time search capabilities of any AI model.
-
[89]
[PDF] ai, data governance and privacy | oecdJun 20, 2024 · The report “AI, data governance, and privacy: Synergies and areas of international co-operation” explores the intersection of AI and privacy ...
-
[90]
OECD updates AI Principles to stay abreast of rapid technological ...May 3, 2024 · The 2024 OECD Ministerial Council Meeting (MCM) has adopted revisions to the landmark OECD Principles on Artificial Intelligence (AI).
-
[91]
Evolving with innovation: The 2024 OECD AI Principles updateMay 20, 2024 · The updated principles now address emerging challenges with an enhanced focus on safety, privacy, intellectual property rights and information integrity.
-
[92]
A Cyber Threat Intelligence Sharing Scheme Based on Consortium ...Oct 13, 2025 · Blockchain technology enables sharing collaboration consortium to conduct a trusted CTI sharing and exchange without a centralized institution.<|separator|>
-
[93]
A self evolving high performance sharded consortium blockchain ...Aug 1, 2025 · A self evolving high performance sharded consortium blockchain designed for secure and trusted resource sharing for 6G networks | Scientific ...
-
[94]
A Secure Data Sharing Platform Using Blockchain and ... - MDPIThis paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS).
-
[95]
2030's Tech Revolution: Reshaping Business for a New DecadeDec 4, 2024 · As quantum computers become capable of breaking current encryption standards, organizations must begin preparing for the post-quantum ...
-
[96]
How can quantum technologies advance the sustainability agenda?Sep 20, 2024 · Quantum technologies might offer a unique opportunity to advance the 17 sustainability goals, from alleviating poverty, to decarbonizing our planet.
-
[97]
Predictions for technology development by 2030 - iteoBy 2030, quantum computing will redefine what's possible in fields like molecular biology, finance, and cryptography. Unlike traditional computers, which ...