-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(docs): Create a top level set of users stories for the project
Signed-off-by: Chris Butler <[email protected]>
- Loading branch information
Showing
1 changed file
with
43 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
--- | ||
title: User stories | ||
--- | ||
|
||
## Motivation | ||
|
||
The intent of these user stories is to provide a north star for this project. | ||
|
||
## User stories | ||
|
||
- As an enterprise application developer I want to be able to serve (multiple) LLM applications from my platform | ||
|
||
- As business application owner I want my LLM to be up to date with my systems of record | ||
|
||
- As a data engineer I need to manage the lifecycle of data surrounding an LLM application including: Ingestion & preparation; building training datasets; Collecting QA data. | ||
|
||
- As a data scientist I want to be able to produce an optimised LLM model to support the enterprise use case. | ||
|
||
- As a data scientist I want ready access to the latest opensource LLM innovations without getting in trouble with security. | ||
|
||
- As an platform engineer I want to provide a platform enabling self-service for LLM development from experiment to production, while maintaining efficient use of the infrastructure (aaS) investment | ||
|
||
- As a security architect I want my LLM development to meet my enterprise wide security policies and controls. | ||
|
||
- As a security architect I want to be able to measure and enforce that software, models and data come from trusted sources. | ||
|
||
- As a SOC analyst I want sufficient capabilities to detect, investigate and correct security related events as they apply to the LLM platform and workloads | ||
|
||
## Actors | ||
|
||
- Application Developer | ||
|
||
- Business application owner | ||
|
||
- Data engineer | ||
|
||
- Data scientist | ||
|
||
- Platform engineer | ||
|
||
- Security architect | ||
|
||
- Security engineer |