The Seven Pillars Of MLops

To unlock the full potential of AI and Machine Learning, organisations must focus on model selection, optimisation, monitoring, scaling, and metrics for success.

Integrating AI and machine learning into business operations is no longer just for companies aiming to stay ahead in an ever-evolving technological landscape. However, many organisations still face challenges in tapping into AI/ML’s true power.

To help resolve this, I’ve explored key trends in MLops and compiled actionable insights to overcome common engineering hurdles.

As you might expect, generative AI models differ significantly from traditional machine learning models in their development, deployment, and operational requirements. I’ll walk through these differences, which range from training and the delivery pipeline to monitoring, scaling, and measuring model success, and leave you with a few key questions organisations should address to guide their AI/ML strategy.

Ultimately, by focusing on solutions, not just models, and by aligning MLops with IT and DevOps systems, organisations can unlock the full potential of their AI initiatives and drive measurable business impacts.

Laying The Groundwork For MLops Success

Like many things in life, to successfully integrate and manage AI and ML into business operations, organisations first need to have a clear understanding of the foundations. The first fundamental of MLops today is understanding the differences between generative AI models and traditional ML models.

Cost is another major differentiator. The calculations of generative AI models are more complex, resulting in higher latency, demand for more computer power, and higher operational expenses. Traditional models, on the other hand, often utilise pre-trained architectures or lightweight training processes, making them more affordable for many organisations. Recent JFrog data found that 14% of UK organisations are still hesitant to use ML models, with cost and complexity key factors.  When determining whether to utilise a generative AI model versus a standard model, organisations must evaluate these criteria and how they apply to their individual use cases.

Optimising & Monitoring Models Effectively 

Optimising models for specific use cases is crucial. For traditional ML, fine-tuning pre-trained models or training from scratch are common strategies. GenAI introduces additional options, such as retrieval-augmented generation (RAG), which allows the use of private data to provide context and ultimately improve model outputs. Choosing between general-purpose and task-specific models also plays a critical role. Do you really need a general-purpose model or can you use a smaller model that is trained for your specific use case? General-purpose models are versatile but often less efficient than smaller, specialised models built for specific tasks.

Model monitoring also requires distinctly different approaches for generative AI and traditional models. Traditional models rely on well-defined metrics like accuracy, precision, and an F1 score, which are straightforward to evaluate. In contrast, generative AI models often involve metrics that are a bit more subjective, such as user engagement or relevance. Good metrics for genAI models are still lacking and it really comes down to the individual use case. Assessing a model is very complicated and can sometimes require additional support from business metrics to understand if the model is acting according to plan.

However, recent JFrog data found that nearly half (47%) of UK organisations are skipping scans, highlighting just how often this crucial aspect of the model is overlooked. In any scenario, businesses must design architectures that can be measured to make sure they deliver the desired output.

Advances In ML Wngineering Tools 

Traditional machine learning has long relied on open source solutions, from open source architectures like LSTM (long short-term memory) and YOLO (you only look once), to open source libraries like XGBoost and Scikit-learn. These solutions have become the standards for most challenges thanks to being accessible and versatile. For genAI, however, commercial solutions like OpenAI’s GPT models and Google’s Gemini currently dominate due to high costs and intricate training complexities. Building these models from scratch means massive data requirements, intricate training, and significant costs.

Despite the popularity of commercial generative AI models, open-source alternatives are gaining traction. Models like Llama and Stable Diffusion are closing the performance gap, offering cost-effective solutions for organisations willing to fine-tune or train them using their specific data. Interestingly, the UK shows greater caution here, 38% of organisations restrict public software downloads, 10% above the global average, which may limit the ability to fully leverage open source options. Open-source models can present licensing restrictions and integration challenges but overly restrictive policies may further complicate efforts to ensure ongoing compliance and efficiency.  

Scaling ML Systems With Precision

As more and more companies decide to invest in AI, there are best practices for data management and classification and architectural approaches that should be considered for scaling ML systems and ensuring high performance.

Leveraging internal data with RAG

Important questions revolve around data: What is my internal data? How can I use it? Can I train based on this data with the correct structure? One powerful strategy for scaling ML systems with genAI is Retrieval-Augmented Generation. RAG is the ability to use internal data to change the context of a general purpose model. By embedding and querying internal data, organisations can provide context-specific answers and improve the relevance of genAI outputs. For instance, uploading product documentation to a vector database allows a model to deliver precise, context-aware responses to user queries. 

Architectural Considerations For Scalable Systems

Creating scalable and efficient MLops architectures requires careful attention to components like embeddings, prompts, and vector stores. Fine-tuning models for specific languages, geographies, or use cases ensures tailored performance. An MLops architecture that supports fine-tuning is more complicated and organisations should prioritise A/B testing across various building blocks to optimise outcomes and refine their solutions.

Measuring Success Through Meaningful Metrics 

Aligning model outcomes with business objectives is essential. Metrics like customer satisfaction and click-through rates can measure real-world impact, helping organisations understand whether their models deliver meaningful results. Human feedback is essential for evaluating generative models and remains the best practice. Human-in-the-loop systems help fine-tune metrics, check performance, and ensure models meet business goals.

In some cases, advanced generative AI tools can assist or replace human reviewers, making the process faster and more efficient. By closing the feedback loop and connecting predictions to user actions, there is opportunity for continuous improvement and more reliable performance.

Building Solutions, Not Just Models

The success of MLops hinges on building holistic solutions rather than isolated models. Solution architectures should combine a variety of ML approaches, including rule-based systems, embeddings, traditional models, and generative AI, to create robust and adaptable frameworks.

Organisations should ask themselves a few key questions to guide their AI/ML strategies:  

  • Do we need a general-purpose solution or a specialised model?
  • How will we measure success and which metrics align with our goals?
  • What are the trade-offs between commercial and open-source solutions, and how do licensing and integration affect our choices?

Ultimately, the takeaway is clear: AI and ML are not just about creating models, they’re about constructing integrated solutions. These solutions combine multiple components, each influencing the overall user experience and the performance metrics derived from them.

As MLops continues to evolve, organisations must prioritise building scalable, metrics driven architectures. By combining the right tools and strategies, businesses can fully unlock the potential of AI and machine learning, fostering innovation and delivering measurable business outcomes. 

Yuval Fernbach is VP, CTO MLops at JFrog

You Might Also Read: 

The Security Risks Behind Shadow ML Adoption:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« TikTok Fined €530M For Breaking EU Rules
Iranian Hackers Attacking Critical Infrastructure »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.