Training terabyte-scale neural networks
Introduce your brand
Take a minute to write an introduction that is short, sweet, and to the point.
Fast and secure training at scale
-

What we do
We are a neural network training service provider who trains your NN model with your data and generates ready-to-deploy model weights.
Our very high throughput system is designed to take your neural networks to production. As the labeled data is generated from business transactions, attains a terabyte scale volumes, the production models need to be refreshed - and we do that best. For data with low drift, we offer the flexibility to start with previous weights, or, if so desired, generate a new random starting weights each run.
Our model specification software insists that every source data record be encrypted using NIST approved codebooks such as Galois Counter Method GCM, or CBC-CS1 or CBC-CS2 using AES 256 or AES 192 or AES 128 encryption. Our implementation decrypts these records only once these are ready to be processed inside the RAM, thus reducing the attack surface to an absolute minimum.
-

Who we help
Organizations across industry domains that need to use terabyte-scale data sets to deploy neural networks-based business processes.
Across all business sizes, the transaction data reaches terabyte-scale volumes fairly easily. While storage and maintenance of such sizes is easy, its ingestion into NN models is still a difficult task.
Our service is designed to offer a low-cost low-latency deployment of the NN model into regular decision making process that a business requires.
-

How we are different
Our implementation considers data security as an non-negotiable imperative. We decrypt the data only in-situ, just before its consumed, and each thread decrypts its own data set. The decrypted data is never written back. The threads are run after accounting for physical RAM and core availability, ensuring that the data is also never written out to a swap device.
This is an AVX-512 native code implementation, so by design, is optimized at an instruction level. The actual run is done on a cloud server machine with capacity suited to your budget.
Our pricing model considers the cloud machine cost as a pass-through component, so you are free to leverage your existing cloud contracts to reduce total cost.
We ingest the data in a normalized form, where each value is replaced by (X-a)/b, and the values of (a,b) do not cross your security perimeter, thus making it impossible for us to reconstruct the data - a very critical security characteristic.
Other than the C run time library that interfaces with the operating system, our code does not use any library by any third party. Every line of code, including all security algorithm implementations, all mathematical functions, all thread management, memory management and scheduling, have been developed in-house to guarantee reliability. All the security implementations are now under certification by NIST.
Contact our implementation partner.
We’re always looking for new opportunities.
Our implementation partner, Blue Forest SW Systems, LLC handles the entire process of managing the customer data in-flow, execute the actual run and manage the publication of the weights back to your system.
We are comfortable working internationally, subject to the export restrictions laws of your country, and US export regulations. The run machine provisioning must be done on a cloud infrastructure located within the United States of America.
Please get in touch and one of the project managers from BFS SW LLC will contact you about beginning the proposal process.
info@blueforestsw.com