[{"data":1,"prerenderedAt":523},["ShallowReactive",2],{"/en-us/the-source/ai/transforming-government-it-ai-for-air-gapped-environments":3,"footer-en-us":32,"the-source-banner-en-us":375,"the-source-navigation-en-us":387,"the-source-newsletter-en-us":415,"footer-source-/en-us/the-source/ai/transforming-government-it-ai-for-air-gapped-environments/":426,"article-site-categories-en-us":431,"transforming-government-it-ai-for-air-gapped-environments-article-hero-category-en-us":433,"transforming-government-it-ai-for-air-gapped-environments-the-source-source-cta-en-us":457,"transforming-government-it-ai-for-air-gapped-environments-category-en-us":469,"transforming-government-it-ai-for-air-gapped-environments-the-source-resources-en-us":481},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":12,"content":16,"type":23,"slug":24,"category":5,"_id":25,"_type":26,"title":27,"_source":28,"_file":29,"_stem":30,"_extension":31},"/en-us/the-source/ai/transforming-government-it-ai-for-air-gapped-environments","ai",false,"",{"layout":9,"template":10,"featured":6,"gatedAsset":11},"the-source","TheSourceArticle","pf-transforming-government-it-ai-for-air-gapped-environments",{"title":13,"description":14,"ogImage":15},"Transforming government IT: AI for air-gapped environments","Discover how government agencies can implement AI capabilities in secure environments while maintaining strict security and regulatory compliance.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464131/pipmg0ffhdazhtdtjck2.png",{"title":13,"date":17,"description":14,"heroImage":15,"keyTakeaways":18,"articleBody":22},"2024-12-01",[19,20,21],"Air-gapped networks provide essential security for government agencies handling sensitive data, but traditionally limit access to artificial intelligence tools that rely on public internet connectivity for functionality.","Modern self-hosted AI solutions enable agencies to leverage advanced capabilities within isolated environments, maintaining complete data sovereignty while meeting mission-critical security standards like NIST FIPS and ICD 503.","Implementing AI in air-gapped systems helps government teams operate efficiently with reduced personnel, accelerate legacy system modernization, and maximize return on existing infrastructure investments without compromising security.","Government agencies face a growing dilemma in today's digital landscape. While artificial intelligence (AI) promises to transform operations and help teams do more with less, traditional AI implementations often conflict with the stringent security requirements of air-gapped environments. This fundamental tension creates what appears to be an impossible choice for CTOs and CIOs: either embrace AI capabilities and accept security risks or maintain strict security protocols and forgo the benefits of AI.\n\nThe reality is that agencies no longer need to make this difficult compromise. Emerging technologies now enable organizations to deploy sophisticated AI tools directly within secure environments - from classified facilities to private clouds and regulated data centers - without requiring external network connections.\n\n## The critical need for secure AI implementation\nWith the federal government spending over $100 billion annually on information technology and most funds directed toward maintaining existing systems, the need for efficient modernization has never been greater. Air-gapped deployments of AI represent a strategic opportunity to address this challenge.\n\nSelf-hosted AI solutions allow government agencies to process vast amounts of sensitive data safely, leveraging natural language processing and other advanced capabilities without exposing information to potential cyber threats. By maintaining complete control over AI infrastructure, organizations can satisfy rigorous compliance requirements while still harnessing AI's transformative potential.\n\nThis approach is particularly crucial for agencies operating critical infrastructure or handling classified information where internet access restrictions are non-negotiable. Modern self-hosted implementations bring AI capabilities directly into these controlled environments, effectively bridging the gap between innovation and security.\n\n## Driving efficiency through secure AI adoption\nThe benefits of deploying AI in air-gapped networks extend beyond simply meeting security requirements. Government teams facing resource constraints and reduced personnel can leverage these tools to dramatically improve operational efficiency across several dimensions:\n\n- Accelerating legacy system modernization while maintaining strict security protocols\n- Automating routine tasks to optimize workforce productivity\n- Enhancing vulnerability detection and resolution capabilities\n- Providing intelligent analysis of complex historical codebases\n- Transforming outdated systems into more maintainable, secure architectures\n\nFor agencies operating in highly regulated sectors, self-hosted AI solutions enable regulatory compliance while still providing the tools necessary to advance mission objectives. Rather than sending data outside secure boundaries for processing, all operations remain within the organization's control, creating a clear chain of custody that satisfies stringent requirements.\n\n## The path forward\nAs government agencies continue to face increasing pressure to modernize while maintaining the highest security standards, self-hosted AI solutions for disconnected environments offer a compelling path forward. By bringing AI capabilities directly into air-gapped systems while leveraging existing infrastructure investments, organizations can drive secure, cost-effective innovation while ensuring mission continuity with optimized teams.\n\nDownload our comprehensive white paper to explore how your agency can implement advanced AI capabilities within your secure infrastructure - without compromising your security posture.\n","guide","transforming-government-it-ai-for-air-gapped-environments","content:en-us:the-source:ai:transforming-government-it-ai-for-air-gapped-environments.yml","yaml","Transforming Government It Ai For Air Gapped Environments","content","en-us/the-source/ai/transforming-government-it-ai-for-air-gapped-environments.yml","en-us/the-source/ai/transforming-government-it-ai-for-air-gapped-environments","yml",{"_path":33,"_dir":34,"_draft":6,"_partial":6,"_locale":7,"data":35,"_id":371,"_type":26,"title":372,"_source":28,"_file":373,"_stem":374,"_extension":31},"/shared/en-us/main-footer","en-us",{"text":36,"source":37,"edit":43,"contribute":48,"config":53,"items":58,"minimal":363},"Git is a trademark of Software Freedom Conservancy and our use of 'GitLab' is under license",{"text":38,"config":39},"View page source",{"href":40,"dataGaName":41,"dataGaLocation":42},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":44,"config":45},"Edit this page",{"href":46,"dataGaName":47,"dataGaLocation":42},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":49,"config":50},"Please contribute",{"href":51,"dataGaName":52,"dataGaLocation":42},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":54,"facebook":55,"youtube":56,"linkedin":57},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[59,117,174,233,301],{"title":60,"links":61,"subMenu":77},"Pricing",[62,67,72],{"text":63,"config":64},"View plans",{"href":65,"dataGaName":66,"dataGaLocation":42},"/pricing/","view plans",{"text":68,"config":69},"Why Premium?",{"href":70,"dataGaName":71,"dataGaLocation":42},"/pricing/premium/","why premium",{"text":73,"config":74},"Why Ultimate?",{"href":75,"dataGaName":76,"dataGaLocation":42},"/pricing/ultimate/","why ultimate",[78],{"title":79,"links":80},"Contact Us",[81,86,91,96,101,106,111],{"text":82,"config":83},"Contact sales",{"href":84,"dataGaName":85,"dataGaLocation":42},"/sales/","sales",{"text":87,"config":88},"Support portal",{"href":89,"dataGaName":90,"dataGaLocation":42},"https://support.gitlab.com","support portal",{"text":92,"config":93},"Customer portal",{"href":94,"dataGaName":95,"dataGaLocation":42},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":97,"config":98},"Status",{"href":99,"dataGaName":100,"dataGaLocation":42},"https://status.gitlab.com/","status",{"text":102,"config":103},"Terms of use",{"href":104,"dataGaName":105,"dataGaLocation":42},"/terms/","terms of use",{"text":107,"config":108},"Privacy statement",{"href":109,"dataGaName":110,"dataGaLocation":42},"/privacy/","privacy statement",{"text":112,"config":113},"Cookie preferences",{"dataGaName":114,"dataGaLocation":42,"id":115,"isOneTrustButton":116},"cookie preferences","ot-sdk-btn",true,{"title":118,"links":119,"subMenu":130},"Product",[120,125],{"text":121,"config":122},"DevSecOps platform",{"href":123,"dataGaName":124,"dataGaLocation":42},"/platform/","devsecops platform",{"text":126,"config":127},"AI-Assisted Development",{"href":128,"dataGaName":129,"dataGaLocation":42},"/gitlab-duo/","ai-assisted development",[131],{"title":132,"links":133},"Topics",[134,139,144,149,154,159,164,169],{"text":135,"config":136},"CICD",{"href":137,"dataGaName":138,"dataGaLocation":42},"/topics/ci-cd/","cicd",{"text":140,"config":141},"GitOps",{"href":142,"dataGaName":143,"dataGaLocation":42},"/topics/gitops/","gitops",{"text":145,"config":146},"DevOps",{"href":147,"dataGaName":148,"dataGaLocation":42},"/topics/devops/","devops",{"text":150,"config":151},"Version Control",{"href":152,"dataGaName":153,"dataGaLocation":42},"/topics/version-control/","version control",{"text":155,"config":156},"DevSecOps",{"href":157,"dataGaName":158,"dataGaLocation":42},"/topics/devsecops/","devsecops",{"text":160,"config":161},"Cloud Native",{"href":162,"dataGaName":163,"dataGaLocation":42},"/topics/cloud-native/","cloud native",{"text":165,"config":166},"AI for Coding",{"href":167,"dataGaName":168,"dataGaLocation":42},"/topics/devops/ai-for-coding/","ai for coding",{"text":170,"config":171},"Agentic AI",{"href":172,"dataGaName":173,"dataGaLocation":42},"/topics/agentic-ai/","agentic ai",{"title":175,"links":176},"Solutions",[177,181,186,191,196,200,205,208,213,218,223,228],{"text":178,"config":179},"Application Security Testing",{"href":180,"dataGaName":178,"dataGaLocation":42},"/solutions/application-security-testing/",{"text":182,"config":183},"Automated software delivery",{"href":184,"dataGaName":185,"dataGaLocation":42},"/solutions/delivery-automation/","automated software delivery",{"text":187,"config":188},"Agile development",{"href":189,"dataGaName":190,"dataGaLocation":42},"/solutions/agile-delivery/","agile delivery",{"text":192,"config":193},"SCM",{"href":194,"dataGaName":195,"dataGaLocation":42},"/solutions/source-code-management/","source code management",{"text":135,"config":197},{"href":198,"dataGaName":199,"dataGaLocation":42},"/solutions/continuous-integration/","continuous integration & delivery",{"text":201,"config":202},"Value stream management",{"href":203,"dataGaName":204,"dataGaLocation":42},"/solutions/value-stream-management/","value stream management",{"text":140,"config":206},{"href":207,"dataGaName":143,"dataGaLocation":42},"/solutions/gitops/",{"text":209,"config":210},"Enterprise",{"href":211,"dataGaName":212,"dataGaLocation":42},"/enterprise/","enterprise",{"text":214,"config":215},"Small business",{"href":216,"dataGaName":217,"dataGaLocation":42},"/small-business/","small business",{"text":219,"config":220},"Public sector",{"href":221,"dataGaName":222,"dataGaLocation":42},"/solutions/public-sector/","public sector",{"text":224,"config":225},"Education",{"href":226,"dataGaName":227,"dataGaLocation":42},"/solutions/education/","education",{"text":229,"config":230},"Financial services",{"href":231,"dataGaName":232,"dataGaLocation":42},"/solutions/finance/","financial services",{"title":234,"links":235},"Resources",[236,241,246,251,256,261,266,271,276,281,286,291,296],{"text":237,"config":238},"Install",{"href":239,"dataGaName":240,"dataGaLocation":42},"/install/","install",{"text":242,"config":243},"Quick start guides",{"href":244,"dataGaName":245,"dataGaLocation":42},"/get-started/","quick setup checklists",{"text":247,"config":248},"Learn",{"href":249,"dataGaName":250,"dataGaLocation":42},"https://university.gitlab.com/","learn",{"text":252,"config":253},"Product documentation",{"href":254,"dataGaName":255,"dataGaLocation":42},"https://docs.gitlab.com/","docs",{"text":257,"config":258},"Blog",{"href":259,"dataGaName":260,"dataGaLocation":42},"/blog/","blog",{"text":262,"config":263},"Customer success stories",{"href":264,"dataGaName":265,"dataGaLocation":42},"/customers/","customer success stories",{"text":267,"config":268},"Remote",{"href":269,"dataGaName":270,"dataGaLocation":42},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":272,"config":273},"GitLab Services",{"href":274,"dataGaName":275,"dataGaLocation":42},"/services/","services",{"text":277,"config":278},"TeamOps",{"href":279,"dataGaName":280,"dataGaLocation":42},"/teamops/","teamops",{"text":282,"config":283},"Community",{"href":284,"dataGaName":285,"dataGaLocation":42},"/community/","community",{"text":287,"config":288},"Forum",{"href":289,"dataGaName":290,"dataGaLocation":42},"https://forum.gitlab.com/","forum",{"text":292,"config":293},"Events",{"href":294,"dataGaName":295,"dataGaLocation":42},"/events/","events",{"text":297,"config":298},"Partners",{"href":299,"dataGaName":300,"dataGaLocation":42},"/partners/","partners",{"title":302,"links":303},"Company",[304,309,314,319,324,329,334,338,343,348,353,358],{"text":305,"config":306},"About",{"href":307,"dataGaName":308,"dataGaLocation":42},"/company/","company",{"text":310,"config":311},"Jobs",{"href":312,"dataGaName":313,"dataGaLocation":42},"/jobs/","jobs",{"text":315,"config":316},"Leadership",{"href":317,"dataGaName":318,"dataGaLocation":42},"/company/team/e-group/","leadership",{"text":320,"config":321},"Team",{"href":322,"dataGaName":323,"dataGaLocation":42},"/company/team/","team",{"text":325,"config":326},"Handbook",{"href":327,"dataGaName":328,"dataGaLocation":42},"https://handbook.gitlab.com/","handbook",{"text":330,"config":331},"Investor relations",{"href":332,"dataGaName":333,"dataGaLocation":42},"https://ir.gitlab.com/","investor relations",{"text":335,"config":336},"Sustainability",{"href":337,"dataGaName":335,"dataGaLocation":42},"/sustainability/",{"text":339,"config":340},"Diversity, inclusion and belonging (DIB)",{"href":341,"dataGaName":342,"dataGaLocation":42},"/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":344,"config":345},"Trust Center",{"href":346,"dataGaName":347,"dataGaLocation":42},"/security/","trust center",{"text":349,"config":350},"Newsletter",{"href":351,"dataGaName":352,"dataGaLocation":42},"/company/contact/","newsletter",{"text":354,"config":355},"Press",{"href":356,"dataGaName":357,"dataGaLocation":42},"/press/","press",{"text":359,"config":360},"Modern Slavery Transparency Statement",{"href":361,"dataGaName":362,"dataGaLocation":42},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"items":364},[365,367,369],{"text":102,"config":366},{"href":104,"dataGaName":105,"dataGaLocation":42},{"text":107,"config":368},{"href":109,"dataGaName":110,"dataGaLocation":42},{"text":112,"config":370},{"dataGaName":114,"dataGaLocation":42,"id":115,"isOneTrustButton":116},"content:shared:en-us:main-footer.yml","Main Footer","shared/en-us/main-footer.yml","shared/en-us/main-footer",{"_path":376,"_dir":377,"_draft":6,"_partial":6,"_locale":7,"visibility":116,"id":378,"title":379,"button":380,"_id":384,"_type":26,"_source":28,"_file":385,"_stem":386,"_extension":31},"/shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18","banner","The Economics of Software Innovation","The Economics of Software Innovation—AI’s $750 Billion Opportunity",{"config":381,"text":383},{"href":382},"/software-innovation-report/","Get the research report","content:shared:en-us:the-source:banner:the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18.yml","shared/en-us/the-source/banner/the-economics-of-software-innovation-2025-08-18",{"_path":388,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":389,"subscribeLink":394,"navItems":398,"_id":411,"_type":26,"title":412,"_source":28,"_file":413,"_stem":414,"_extension":31},"/shared/en-us/the-source/navigation",{"altText":390,"config":391},"the source logo",{"src":392,"href":393},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/the-source/",{"text":395,"config":396},"Subscribe",{"href":397},"#subscribe",[399,403,407],{"text":400,"config":401},"Artificial Intelligence",{"href":402},"/the-source/ai/",{"text":404,"config":405},"Security & Compliance",{"href":406},"/the-source/security/",{"text":408,"config":409},"Platform & Infrastructure",{"href":410},"/the-source/platform/","content:shared:en-us:the-source:navigation.yml","Navigation","shared/en-us/the-source/navigation.yml","shared/en-us/the-source/navigation",{"_path":416,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":417,"description":418,"submitMessage":419,"formData":420,"_id":423,"_type":26,"_source":28,"_file":424,"_stem":425,"_extension":31},"/shared/en-us/the-source/newsletter","The Source Newsletter","Stay updated with insights for the future of software development.","You have successfully signed up for The Source’s newsletter.",{"config":421},{"formId":422,"formName":352,"hideRequiredLabel":116},1077,"content:shared:en-us:the-source:newsletter.yml","shared/en-us/the-source/newsletter.yml","shared/en-us/the-source/newsletter",{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":427,"seo":428,"content":429,"type":23,"slug":24,"category":5,"_id":25,"_type":26,"title":27,"_source":28,"_file":29,"_stem":30,"_extension":31},{"layout":9,"template":10,"featured":6,"gatedAsset":11},{"title":13,"description":14,"ogImage":15},{"title":13,"date":17,"description":14,"heroImage":15,"keyTakeaways":430,"articleBody":22},[19,20,21],{"categoryNames":432},{"ai":400,"platform":408,"security":404},{"_path":434,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"type":435,"config":436,"seo":437,"content":440,"slug":5,"_id":454,"_type":26,"title":7,"_source":28,"_file":455,"_stem":456,"_extension":31},"/en-us/the-source/ai","category",{"layout":9},{"title":400,"description":438,"ogImage":439},"Explore expert insights on how AI is transforming software development, and how organizations can get the most out of their AI investments.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463300/eoudcbj5aoucl0spsp0c.png",[441,446],{"componentName":442,"type":442,"componentContent":443},"TheSourceCategoryHero",{"title":400,"description":438,"image":444},{"config":445},{"src":439},{"componentName":447,"type":447,"componentContent":448},"TheSourceCategoryMainSection",{"config":449},{"sourceCTAs":450},[451,452,453],"source-lp-how-to-get-started-using-ai-in-software-development","navigating-ai-maturity-in-devsecops","source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach","content:en-us:the-source:ai:index.yml","en-us/the-source/ai/index.yml","en-us/the-source/ai/index",{"_path":458,"_dir":459,"_draft":6,"_partial":6,"_locale":7,"config":460,"title":13,"link":463,"_id":466,"_type":26,"_source":28,"_file":467,"_stem":468,"_extension":31},"/shared/en-us/the-source/gated-assets/pf-transforming-government-it-ai-for-air-gapped-environments","gated-assets",{"formId":461,"utmCampaign":462,"slug":11},1002,"eg_global_cmp_gated-content_aisdlc_en_governmentairgappedai",{"config":464},{"href":465},"https://learn.gitlab.com/the-source-ai/whitepaper-government-it-ai-air-gapped","content:shared:en-us:the-source:gated-assets:pf-transforming-government-it-ai-for-air-gapped-environments.yml","shared/en-us/the-source/gated-assets/pf-transforming-government-it-ai-for-air-gapped-environments.yml","shared/en-us/the-source/gated-assets/pf-transforming-government-it-ai-for-air-gapped-environments",{"_path":434,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"type":435,"config":470,"seo":471,"content":472,"slug":5,"_id":454,"_type":26,"title":7,"_source":28,"_file":455,"_stem":456,"_extension":31},{"layout":9},{"title":400,"description":438,"ogImage":439},[473,477],{"componentName":442,"type":442,"componentContent":474},{"title":400,"description":438,"image":475},{"config":476},{"src":439},{"componentName":447,"type":447,"componentContent":478},{"config":479},{"sourceCTAs":480},[451,452,453],[482,497,510],{"_path":483,"_dir":484,"_draft":6,"_partial":6,"_locale":7,"config":485,"title":486,"description":487,"link":488,"_id":494,"_type":26,"_source":28,"_file":495,"_stem":496,"_extension":31},"/shared/en-us/the-source/source-lp-ctas/navigating-ai-maturity-in-devsecops","source-lp-ctas",{"slug":452},"Navigating AI maturity in DevSecOps","Read our survey findings from more than 5,000 DevSecOps professionals worldwide for insights on how organizations are incorporating AI into the software development lifecycle.",{"text":489,"config":490},"Read the report",{"href":491,"dataGaName":492,"dataGaLocation":493},"/developer-survey/2024/ai/","Navigating AI Maturity in DevSecOps","thesource","content:shared:en-us:the-source:source-lp-ctas:navigating-ai-maturity-in-devsecops.yml","shared/en-us/the-source/source-lp-ctas/navigating-ai-maturity-in-devsecops.yml","shared/en-us/the-source/source-lp-ctas/navigating-ai-maturity-in-devsecops",{"_path":498,"_dir":484,"_draft":6,"_partial":6,"_locale":7,"config":499,"title":500,"description":501,"link":502,"_id":507,"_type":26,"_source":28,"_file":508,"_stem":509,"_extension":31},"/shared/en-us/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"slug":453},"AI guide for enterprise leaders: Building the right approach","Download our guide for enterprise leaders to learn how to prepare your C-suite, executive leadership, and development teams for what AI can do today — and will do in the near future — to accelerate software development.",{"text":503,"config":504},"Read the guide",{"href":505,"dataGaName":506,"dataGaLocation":493},"/the-source/ai/ai-guide-for-enterprise-leaders-building-the-right-approach/","AI Guide For Enterprise Leaders: Building the Right Approach","content:shared:en-us:the-source:source-lp-ctas:source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/en-us/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/en-us/the-source/source-lp-ctas/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"_path":511,"_dir":484,"_draft":6,"_partial":6,"_locale":7,"config":512,"title":513,"description":514,"link":515,"_id":520,"_type":26,"_source":28,"_file":521,"_stem":522,"_extension":31},"/shared/en-us/the-source/source-lp-ctas/source-lp-how-to-get-started-using-ai-in-software-development",{"slug":451},"How to get started using AI in software development","Learn how to strategically implement AI to boost efficiency, security, and reduce context switching. Empower every member of your team with AI capabilities.",{"text":516,"config":517},"Download the guide",{"href":518,"dataGaName":519,"dataGaLocation":493},"/the-source/ai/getting-started-with-ai-in-software-development-a-guide-for-leaders/","How to Get Started Using AI in Software Development","content:shared:en-us:the-source:source-lp-ctas:source-lp-how-to-get-started-using-ai-in-software-development.yml","shared/en-us/the-source/source-lp-ctas/source-lp-how-to-get-started-using-ai-in-software-development.yml","shared/en-us/the-source/source-lp-ctas/source-lp-how-to-get-started-using-ai-in-software-development",1761814428409]