Table of Contents
Monster API utilizes GPU computing power such as mining equipment to train AI models
Distributed computing power network can significantly reduce the cost of AI basic model training
Open source model training can help developers innovate with AI
Home Technology peripherals AI Using a distributed network to connect idle GPUs in series, this startup claims to reduce AI model training costs by 90%

Using a distributed network to connect idle GPUs in series, this startup claims to reduce AI model training costs by 90%

Jun 15, 2023 pm 02:18 PM
ai


Using a distributed network to connect idle GPUs in series, this startup claims to reduce AI model training costs by 90%

Monster API utilizes GPU computing power such as mining equipment to train AI models

GPUs are often used to mine cryptocurrencies such as Bitcoin , and mining is a resource-intensive process that requires powerful computing power.

Cryptocurrency hype once led to a shortage of GPUs on the market, and as prices soared, businesses and individuals turned to Nvidia's GPUs for the gaming industry and turned them into dedicated GPUs for crypto mining rigs.

However, as the cryptocurrency craze subsided, many crypto mining equipment were shut down or even abandoned. This made Monster API founder Gaurav Vij realize that they could repurpose and repurpose these devices to adapt to the latest computing-intensive development trend, which is to train and run basic AI models.

While these GPUs don’t have the power of dedicated AI appliances deployed by the likes of AWS or Google Cloud, Gaurav Vij said they are capable of training optimized open source models at the cost of using cloud computing providers. A small part of a very large scale computing device.

Monster API co-founder Saurabh Vij said: "The machine learning field is actually struggling with computing power because demand has exceeded supply. Today, many machine learning developers are spending a lot of money relying on AWS , Google Cloud, Microsoft Azure and other cloud service providers to obtain resources.”

Distributed computing power network can significantly reduce the cost of AI basic model training

In fact, in addition to encryption mining equipment, Unused GPUs can also be found in gaming systems like the PlayStation 5 and smaller data centers. Saurabh Vij said: “Crypto mining platforms use GPUs, gaming systems use GPUs, and GPUs become more powerful every year.”

Joining a distributed network requires multiple steps, including data security checks wait. Involving the computing power of enterprises and individuals. The demander adds equipment according to needs and expands and shrinks the computing power network. The supply side can obtain part of the revenue from selling idle computing power.

Saurabh Vij emphasized that distributed computing systems reduce the cost of training basic AI models to the point that they can be trained by open source and non-profit organizations in the future, not just large technology companies with deep financial resources. Compared to building a basic AI model that costs $1 million, a decentralized network like ours only costs $100,000. ”

Geek.com learned that Monster API now also provides “code-free” tools to fine-tune models and is open to users without technical expertise or resources, allowing them to train models from scratch to further “democratize” Computing power and AI basic models.

It is important to fine-tune because many developers do not have a sufficient amount of data and funds to retrain the model. He said that due to the optimization of the Monster API, the cost of fine-tuning has been reduced 90%, resulting in a fine-tuning fee of approximately $30 per model.

Open source model training can help developers innovate with AI

While AI developers face looming regulations, this may There is a direct impact on these training models and open source, but Saurabh Vij believes that open source model training has its positives. Monster API has recognized the need to manage potential risks in its decentralized network and ensure "traceability, transparency and accountability" ".

"Although regulatory authorities may win in the short term, I have great confidence in the open source community and its incredibly rapid development.". There are 25 million registered developers on Postman (API development platform) , a big part of it is building generative AI, which opens up new businesses and new opportunities for everyone," he said.

Geek.com learned that by training low-cost AI models, the goal of Monster API is to allow developers to maximize the use of machine learning for innovation. At present, they already have some well-known AI models (such as Stable Diffusion and Whisper) that can be fine-tuned. In addition, users can also use these GPU computing power to train their own AI basic models from scratch.

Saurabh Vij said: "We have conducted text and image generation experiments on Macbooks and can output at least 10 images per minute. We hope to connect millions of Macbooks to the network to allow users to sleep while sleeping They can also use their Macbooks to run Stable Diffusion, Whisper or other AI models to make money.

"Eventually, Playstation, Xbox, Macbook will become powerful computing resources, and even Tesla cars - because Tesla cars also use powerful GPUs and spend most of their time parked in garages. ” Saurabh Vij added.

The above is the detailed content of Using a distributed network to connect idle GPUs in series, this startup claims to reduce AI model training costs by 90%. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How to set the Debian Apache log level How to set the Debian Apache log level Apr 13, 2025 am 08:33 AM

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How to perform digital signature verification with Debian OpenSSL How to perform digital signature verification with Debian OpenSSL Apr 13, 2025 am 11:09 AM

Using OpenSSL for digital signature verification on Debian systems, you can follow these steps: Preparation to install OpenSSL: Make sure your Debian system has OpenSSL installed. If not installed, you can use the following command to install it: sudoaptupdatesudoaptininstallopenssl to obtain the public key: digital signature verification requires the signer's public key. Typically, the public key will be provided in the form of a file, such as public_key.pe

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

See all articles