DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Related

  • AI Speaks for the World... But Whose Humanity Does It Learn From?
  • Artificial Intelligence, Real Consequences: Balancing Good vs Evil AI [Infographic]
  • The Rise of Shadow AI: When Innovation Outpaces Governance
  • Gemma 3: Unlocking GenAI Potential Using Docker Model Runner

Trending

  • Distributed Consensus: Paxos vs. Raft and Modern Implementations
  • Operational Principles, Architecture, Benefits, and Limitations of Artificial Intelligence Large Language Models
  • Using Python Libraries in Java
  • Next Evolution in Integration: Architecting With Intent Using Model Context Protocol
  1. DZone
  2. Data Engineering
  3. AI/ML
  4. AIGenOps: Generative AI and Platform Engineering

AIGenOps: Generative AI and Platform Engineering

In the domain of regulated software, especially in the banking environment where we work, there are constraints of security, quality, and network limitations.

By 
Nicolas Fantoni user avatar
Nicolas Fantoni
·
Riccardo Soro user avatar
Riccardo Soro
·
Jul. 29, 24 · Opinion
Likes (6)
Comment
Save
Tweet
Share
3.0K Views

Join the DZone community and get the full member experience.

Join For Free

A While Ago...

We have been collaborating with a client in finance for some time now, and in a moment of relaxation, we started discussing generative artificial intelligence. And so, caught up in the excitement, as in a positive retroactive system, we began to sketch out the idea of how to integrate it and implement it in the real-world scenario in which we found ourselves. 

Merging the LLM/AI skills and knowledge of a DevOps engineer with the vision of a platform engineer, we began to define the requirements, constraints, and loads of a real scenario in the area of regulated software and then define possible processes and solutions. 

But in Which Context?

In the domain of regulated software, especially in the banking environment where we work, there are constraints of security, quality, and network limitations. Added to this are CI/CD loads that can be very high in numbers, already overloaded developers, and cost management. From here the list of initial requirements:  

  • On-prem system or on managed VM or private cloud, potentially air-gapped 
  • No performance drops in CI and CD pipelines 
  • A zero-trust model with approval from the dev 
  • Selection of components to be impacted 
  • Limitation of generated objects 

The last two points, rather than strong constraints are intended as common sense practices to better address the issues.

Which in Detail...

In the area of regulated software as well as limitations on network reachability (dealing with possible trade secrets) you do not want your data and code to be sent outside on unsecured or unverified systems. Therefore, the system should be hosted on private machines in well-segregated networks. Generative AI processes have a high impact on resource consumption, as well as can require high processing times. Therefore, to limit time and performance impact, they cannot be introduced into the CI/CD cycle: we then assumed an asynchronous and independent “continuous generative loop.” 

As a system subject to certification and verification, and having to try to limit improper introductions, one must necessarily approach a zero-trust model, in which the “continuous generative loop” proposes pull requests (also referred to below as PRs) that a manager must validate and approve. With these assumptions, remembering that one of the principles behind platform engineering is “starting with the dev” and wanting to limit processing cost and time, one cannot generate thousands of lines of code in all applications. The generation part should then:

Select and Prioritize Only Those Applications on Which To Take Action

If, for example, there were 3 applications

  1. One with coverage around 85% and a few code smells,
  2. One with coverage around 80%, many code smells, and a few minor bugs
  3. One with 60% coverage and critical vulnerabilities

The system should prioritize the last application and work on that one to equalize the overall level of the application pool.

Limit the Objects Generated

If we require a manager or developer to validate a pull request, in case it contains a massive amount of deliverables, the worst-case scenarios are that the PR is either rejected in its entirety or it is summarily checked, with the risk of introducing errors.  

To make sure that the generation activity is in synergy with the day-to-day work of the devs, one has to act by selecting and prioritizing the activities, going for the few (hopefully!) most impactful bugs/vulnerabilities, or covering with tests the most uncovered class with the highest impact. 

The selection and prioritization approach allows for faster processing, lower costs, and acting only on the applications that really need external help, but above all not impact the work of the developers.

What Next?

And then the next steps will be: 

  • Define the application prioritization and selection algorithms 
  • Define the selection and prioritization algorithms for quality/vulnerability resolutions and code coverage 
  • Based on the principles of innovation management and platform engineering, identify early adopters, and pioneers to implement in a usable way a solution in a real-world environment, with the help of skilled developers that can collaborate on the optimal development for the end user

In Conclusion

It is possible to introduce generative AI into an IDP in a regulated context, respecting all the constraints and requirements of the environment, without neglecting the end user and his user experience with the system.

AI generative AI

Opinions expressed by DZone contributors are their own.

Related

  • AI Speaks for the World... But Whose Humanity Does It Learn From?
  • Artificial Intelligence, Real Consequences: Balancing Good vs Evil AI [Infographic]
  • The Rise of Shadow AI: When Innovation Outpaces Governance
  • Gemma 3: Unlocking GenAI Potential Using Docker Model Runner

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!