Navigating the Latest Technology Radar: A Step-by-Step Guide to Applying AI and Security Insights

By • min read

Introduction

ThoughtWorks recently released the 34th edition of its Technology Radar, a biannual survey that distills real-world experience with tools, techniques, platforms, and languages. This volume contains 118 blips, each offering a concise impression of an element that has caught the attention of practitioners. The radar is heavily focused on AI, but it also revisits foundational practices and emphasizes security – particularly around 'permission hungry' agents. Use this step-by-step guide to extract actionable insights from the radar and apply them to your own technology strategy.

Navigating the Latest Technology Radar: A Step-by-Step Guide to Applying AI and Security Insights
Source: martinfowler.com

What You Need

Step-by-Step Guide

Step 1: Understand the Radar’s Purpose and Structure

Begin by exploring the overall layout. Each blip is categorized under Techniques, Tools, Platforms, or Languages & Frameworks. Items are rated as Adopt, Trial, Assess, or Hold. Skim the table of contents to identify clusters of interest. For edition 34, AI-related blips dominate, but you’ll also find entries on pair programming, zero trust architecture, mutation testing, DORA metrics, clean code, and deliberate design.

Step 2: Identify AI-Oriented Topics and Their Implications

Focus on the many AI blips. The radar highlights how LLM-assisted tools are reshaping development – not just by enabling new capabilities but also by forcing teams to revisit foundational software craftsmanship. Note that agentic tools like OpenClaw and Claude Cowork supervise real work tasks, while Gas Town coordinates agent swarms across entire codebases. These tools require broad access to private data, external communication, and real systems. Understand how such agents could accelerate your workflows, but also consider the complexity they introduce.

Step 3: Revisit Foundational Practices as a Counterbalance

The radar deliberately returns to established techniques to counterbalance AI-generated complexity. During your review, consider: Are you using pair programming effectively? Are you tracking DORA metrics for DevOps performance? Do you apply mutation testing for code quality? The radar suggests that clean code, deliberate design, testability, and accessibility as a first-class concern remain crucial. The resurgence of the command line – now a primary interface for agentic tools – is also highlighted. Re-energize these practices within your team as a foundation for safely adopting AI.

Step 4: Strengthen Security for Permission-Hungry Agents

Security expert Jim Gumbley joined the radar writing team for this edition, underscoring the serious security concerns around LLMs. Pay special attention to the theme of securing “permission hungry” agents. These agents need extensive access to function, but safeguards haven’t caught up with their ambition. Key risks include prompt injection, where models cannot reliably distinguish trusted instructions from untrusted input. Use the radar’s security blips to evaluate zero trust architecture, input validation, and access control patterns. Involve your security team early in any agent experimentation.

Step 5: Explore Harness Engineering for Governance

Many blips in this radar deal with Harness Engineering – the practice of building guides, sensors, and controls to govern complex systems. This was a major theme from the radar meeting, as captured in Birgitta’s article on the subject. Review the suggested harness components: observability dashboards, policy engines, audit trails, and feedback loops. Implement a harness for your AI agents to ensure they operate within safe boundaries. The radar lists several specific tools and techniques to consider; treat this as a starting point that will expand in the next edition.

Step 6: Plan for Continuous Monitoring and Future Updates

The Technology Radar is released every six months. After applying insights from this edition, set a reminder for the next release. Schedule a follow-up review to track how your adopted blips have performed and to incorporate new recommendations. The radar’s authors expect the harness engineering list to grow. Use this cadence to keep your technology strategy adaptive and aligned with real-world experience.

Tips for Success

Recommended

Discover More

Uncovering a Botnet Operated by a Brazilian DDoS Protection FirmNew Data Generation Methods Break AI Training Bottleneck with Minimal ExamplesHow to Get Started with Microsoft's New Professional Certificates on CourseraFrom CCP to Fenris: Understanding EVE Online Studio's Independence and AI PartnershipEnhancing Deployment Resilience at GitHub with eBPF