Radar has landed - discover the latest DDoS attack trends. Get ahead, stay protected.Get the report
Under attack?

Products

Solutions

Resources

Partners

Why Gcore

  1. Home
  2. Blog
  3. A guide to running an ML model that makes diagnoses based on chest X-rays

A guide to running an ML model that makes diagnoses based on chest X-rays

  • By Gcore
  • February 16, 2023
  • 5 min read
A guide to running an ML model that makes diagnoses based on chest X-rays

Our partners at Graphcore have run the vit-base-patch16-224-in21k ML model and trained it using 30,000 chest X-rays. Now, the model can diagnose chest diseases. In this article, we’ll tell you how to repeat Graphcore’s success with our AI infrastructure, including how to run this model on our equipment and how much it costs.

Introduction

Today’s experiment will be conducted by Mikhail Khlystun, Head of Cloud Operation, responsible for AI at Gcore. We’ll follow him step by step through running a medical machine learning (ML) model that can diagnose based on X-rays. We’ll set up the cluster, download the dataset and model, and train it. Next, we’ll test the result by checking how the model can diagnose based on test X-rays. Finally, we’ll compare the price of running the model on different flavors and find out which cluster is the most favorable to run it on.

How to run the ML model

1. Create an AI cluster to run the model. This can be done through the Gcore Control panel. Select the region, flavor, OS image, and network setting, and generate an SSH key. Click Create cluster, and we’re all set.

2. Access the cluster.

ssh ubuntu@193.57.88.205

3. Create a localdata directory for the dataset and move to it.

mkdir localdata; cd localdata

4. Create a directory in which the model is expected to find its dataset.

mkdir chest-xray-nihcc; cd chest-xray-nihcc

5. Next, we need a dataset of 112,120 chest X-rays from 30,805 patients. The dataset is available at https://nihcc.app.box.com/v/ChestXray-NIHCC. The images directory contains parts of the 42 GB archive that must be downloaded and extracted. The batch_download_zips.py script can be used to make downloading easy.

wget "https://nihcc.app.box.com/index.php?rm=box_download_shared_file&vanity_name=ChestXray-NIHCC&file_id=f_371647823217" -O batch_download_zips.py

6. Download the dataset.

python batch_download_zips.py

7. Extract the downloaded parts of the archive.

for i in $(ls -1 images_*);do tar xvf ${i}; done

8. Download the metadata file. This file contains the “correct answers”, i.e., the doctors’ diagnoses for each dataset scan. We’ll use them to train and validate the model.

Our metadata contains the following fields: image file name, detected markers, age, gender, etc. The distribution of diagnoses according to the images presented in the archive is as follows (Source: https://nihcc.app.box.com/v/ChestXray-NIHCC).

wget "https://nihcc.app.box.com/index.php?rm=box_download_shared_file&vanity_name=ChestXray-NIHCC&file_id=f_219760887468" -O Data_Entry_2017_v2020.csv

9. Check the file contents.

head Data_Entry_2017_v2020.csv

Result:

All the data is ready. Almost everything is ready to run the model.

10. Let’s move to the directory with the model code.

cd ~/graphcore/tutorials/tutorials/pytorch/vit_model_training/

11. Run the docker image with jupyter and the pytorch library that our model will work with.

gc-docker -- -it --rm -v ${PWD}:/host_shared_dir -v /home/ubuntu/localdata/:/dataset graphcore/pytorch-jupyter:3.0.0-ubuntu-20.04-20221025

After executing the command, we find ourselves inside the container. All subsequent commands have to be executed there unless clearly specified otherwise.

12. Go to the directory mounted from the host machine, where you’ll see the following contents:

For everything to work correctly, we need to replace sklearn with scikit-learn in the requirements.txt file. It can be done with any text editor or with a command:

sed -i ‘s/sklearn/scikit-learn/’ requirements.txt

13. Set an environment variable with the path to the dataset.

export DATASET_DIR=/dataset

14. Now we can run jupyter.

jupyter-notebook --no-browser --port 8890 --allow-root --NotebookApp.password='' --NotebookApp.token=''

This command starts the jupyter-notebook web server without authorization and connects only via localhost. This will require using an SSH tunnel but will eliminate unauthorized access.

15. Set up a new SSH session with our AI cluster, enabling the tunnel for port 8890. In a separate window, execute the following command:

ssh -NL 8890:localhost:8890 ubuntu@193.57.88,205

16. In the browser, follow the link

http://127.0.0.1:8890/notebooks/walkthrough.ipynb

.

We should see the following:

We’re one step away from starting the model training. Just click “Run All”.

In 15 minutes, you can see the results. Here are a few examples downloaded from the dataset:

Here are the loss function and learning_rate graphs for the training set.

The following results were obtained in the evaluation set:

Model testing

We trained the model on 112,122 chest scans. It should now have a high probability of making the correct diagnosis by processing a new image. We’ll check by adding nine new scans whose diagnoses are unknown to the model.

To do this, we’ll add more cells to the notebook with the code.

1. Let’s save the results of our model training.

trainer.save_model()trainer.save_state()

2. Download the necessary modules.

 from transformers import AutoModelForImageClassification, AutoFeatureExtractorfrom PIL import Imageimport torch

3. Download feature_extractor and model from the saved files.

feature_extractor = AutoFeatureExtractor.from_pretrained(‘./results’)model = AutoModelForImageClassification.from_pretrained(‘./results’)

4. Let’s transfer looped scans from the dataset for “diagnosing”, output it as the header for images, and add the correct value for comparison.

fig = plt.figure(figsize=(20, 15))unique_labels = np.array(unique_labels)convert_image_to_float = transforms.ConvertImageDtype(dtype=torch.float32)for i, data_dict in enumerate(dataset["validation"]):    if i == 9:        break        image = data_dict["pixel_values"]    image = convert_image_to_float(image)    label = data_dict["labels"]            image_img = Image.open(data_dict["image"].filename)    encoding = feature_extractor(image_img.convert("RGB"), return_tensors="pt")        with torch.no_grad():        outputs = model(**encoding)        logits = outputs.logits    predicted_class_idx = logits.argmax(-1).item()            ax = plt.subplot(3, 3, i + 1)    ax.set_title("Prediction: " + id2label[predicted_class_idx] + "|Real: " + ", ".join(unique_labels[np.argwhere(label).flatten()]))    plt.imshow(image[0])fig.tight_layout()

The pictures above show the model predictions and the actual diagnosis. Not all results are accurate, but the inaccuracies are within the AUCROC=0.7681 and loss=0.1875 metrics. Most of the predictions fully or partially coincide with the diagnosis made by the doctor.

Please note that, regardless of the quality of the model, an ML model is no substitute for a doctor. The model can only be a good aid in giving a preliminary result that then needs to be validated.

How much it costs

Let’s calculate how much it would cost to get involved with science and reproduce this experiment. For comparison, we’ll take the cost of running the model on three flavors:

  • Minimum configuration: vPOD4 + Poplar server on a CPU60 virtual machine
  • Medium configuration: vPOD4 + bare metal Poplar server.
  • High configuration: vPOD16 + bare metal Poplar sever.

The names of the flavors and their cost per hour of use are given in the table.

We have divided the process of starting an ML model into two parts: preparation and training. Each measurement was repeated 10 times. The tables below show the average of the 10 attempts.

Preparation

Preparation includes downloading the dataset, extracting the images, and running the commands from the guide above. Their execution time doesn’t depend on which AI cluster you rent; it’s just a routine that you do. But the price will differ because of the flavors’ prices.

The model training includes all the actions that AI performs. Their duration depends on the flavor. The more powerful the AI cluster is, the faster it processes the data and yields results. We calculated net training and validation times using internal monitoring metrics. You can also calculate those using the %time command, which should be added as the first line to the desired cell in jupyter.

The figures show that increasing the cluster size significantly reduces the time it takes to train the model. vPOD16 was twice as fast as vPOD4.

Let’s summarize the figures to make it easy to assess the difference.

It’s worth noting that with large datasets, the time/money ratio will vary. Think of the small and large clusters like a truck and a Boeing. If cargo needs to be transported a short distance, a giant Boeing doesn’t have enough time to gain altitude and accelerate before it needs to land, so a truck can easily outrun it. But if we’re talking about really long distances (datasets), Boeing has the advantage. If your datasets are measured in hundreds and thousands of gigabytes, using vPOD16, vPOD64, and vPOD128 will show a considerable speed advantage.

If we increase our dataset 500-fold, the time to train the ML model will increase linearly. In this case, we’d get the following figures:

As you can see, the time/money ratio is very different—with a large dataset, a high configuration gives a lot of advantages. 

Conclusion

ML models are reshaping our lives. They help create pictures and game assets, write code, create text, and make medical diagnoses.

Today, we saw how you can run and train an open-source model to analyze chest X-rays in just two hours. We ran it on Gcore AI Infrastructure, which is designed to get the results of ML tasks quickly. Owing to it, training took only 6-15 minutes (depending on the selected cluster configuration), and most of the time was spent downloading the model and working with the code.

A comparison of AI clusters proved that working with a small dataset on a cluster with a minimal configuration is more profitable. When proceeding with small tasks, it’s almost as fast as a high configuration and way cheaper (we spent only $17). But the situation changes with a large dataset. If you increase the dataset 500-fold, the powerful cluster gets a huge speed advantage. It’ll handle the task twice as fast as its little brother.

Related articles

How gaming studios can use technology to safeguard players

Online gaming can be an enjoyable and rewarding pastime, providing a sense of community and even improving cognitive skills. During the pandemic, for example, online gaming was proven to boost many players’ mental health and provided a vital social outlet at a time of great isolation. However, despite the overall benefits of gaming, there are two factors that can seriously spoil the gaming experience for players: toxic behavior and cyber attacks.Both toxic behavior and cyberattacks can lead to players abandoning games in order to protect themselves. While it’s impossible to eradicate harmful behaviors completely, robust technology can swiftly detect and ban bullies as well as defend against targeted cyberattacks that can ruin the gaming experience.This article explores how gaming studios can leverage technology to detect toxic behavior, defend against cyber threats, and deliver a safer, more engaging experience for players.Moderating toxic behavior with AI-driven technologyToxic behavior—including harassment, abusive messages, and cheating—has long been a problem in the world of gaming. Toxic behavior not only affects players emotionally but can also damage a studio’s reputation, drive churn, and generate negative reviews.The online disinhibition effect leads some players to behave in ways they may not in real life. But even when it takes place in a virtual world, this negative behavior has real long-term detrimental effects on its targets.While you can’t control how players behave, you can control how quickly you respond.Gaming studios can implement technology that makes dealing with toxic incidents easier and makes gaming a safer environment for everyone. While in the past it may have taken days to verify a complaint about a player’s behavior, today, with AI-driven security and content moderation, toxic behavior can be detected in real time, and automated bans can be enforced. The tool can detect inappropriate images and content and includes speech recognition to detect derogatory or hateful language.In gaming, AI content moderation analyzes player interactions in real time to detect toxic behavior, harmful content, and policy violations. Machine learning models assess chat, voice, and in-game media against predefined rules, flagging or blocking inappropriate content. For example, let’s say a player is struggling with in-game harassment and cheating. With AI-powered moderation tools, chat logs and gameplay behavior are analyzed in real time, identifying toxic players for automated bans. This results in healthier in-game communities, improved player retention, and a more pleasant user experience.Stopping cybercriminals from ruining the gaming experienceAnother factor negatively impacting the gaming experience on a larger scale is cyberattacks. Our recent Radar Report showed that the gaming industry experienced the highest number of DDoS attacks in the last quarter of 2024. The sector is also vulnerable to bot abuse, API attacks, data theft, and account hijacking.Prolonged downtime damages a studio’s reputation—something hackers know all too well. As a result, gaming platforms are prime targets for ransomware, extortion, and data breaches. Cybercriminals target both servers and individual players’ personal information. This naturally leads to a drop in player engagement and widespread frustration.Luckily, security solutions can be put in place to protect gamers from this kind of intrusion:DDoS protection shields game servers from volumetric and targeted attacks, guaranteeing uptime even during high-profile launches. In the event of an attack, malicious traffic is mitigated in real-time, preventing zero downtime and guaranteeing seamless player experiences.WAAP secures game APIs and web services from bot abuse, credential stuffing, and data breaches. It protects against in-game fraud, exploits, and API vulnerabilities.Edge security solutions reduce latency, protecting players without affecting game performance. The Gcore security stack helps ensure fair play, protecting revenue and player retention.Take the first steps to protecting your customersGaming should be a positive and fun experience, not fraught with harassment, bullying, and the threat of cybercrime. Harmful and disruptive behaviors can make it feel unsafe for everyone to play as they wish. That’s why gaming studios should consider how to implement the right technology to help players feel protected.Gcore was founded in 2014 with a focus on the gaming industry. Over the years, we have thwarted many large DDoS attacks and continue to offer robust protection for companies such as Nitrado, Saber, and Wargaming. Our gaming specialization has also led us to develop game-specific countermeasures. If you’d like to learn more about how our cybersecurity solutions for gaming can help you, get in touch.Speak to our gaming solutions experts today

Gcore and Northern Data Group partner to transform global AI deployment

Gcore and Northern Data Group have joined forces to launch a new chapter in enterprise AI. By combining high-performance infrastructure with intelligent software, the commercial and technology partnership will make it dramatically easier to deploy AI applications at scale—wherever your users are. At the heart of this exciting new partnership is a shared vision: global, low-latency, secure AI infrastructure that’s simple to use and ready for production.Introducing the Intelligence Delivery NetworkAI adoption is accelerating, but infrastructure remains a major bottleneck. Many enterprises discover blockers regarding latency, compliance, and scale, especially when deploying models in multiple regions. The traditional cloud approach often introduces complexity and overhead just when speed and simplicity matter most.That’s where the Intelligence Delivery Network (IDN) comes in.The IDN is a globally distributed AI network built to simplify inference at the edge. It combines Northern Data’s state-of-the-art infrastructure with Gcore Everywhere Inference to deliver scalable, high-performance AI across 180 global points of presence.By locating AI workloads closer to end users, the IDN reduces latency and improves responsiveness—without compromising on security or compliance. Its geo-zoned, geo-balanced architecture ensures resilience and data locality while minimizing deployment complexity.A full AI deployment toolkitThe IDN is a full AI deployment toolkit built on Gcore’s cloud-native platform. The solution offers a vertically integrated stack designed for speed, flexibility, and scale. Key components include the following:Managed Kubernetes for orchestrationA container-based deployment engine (Docker)An extensive model library, supporting open-source and custom modelsEverywhere Inference, Gcore’s software for distributing inferencing across global edge points of presenceThis toolset enables fast, simple deployments of AI workloads—with built-in scaling, resource management, and observability. The partnership also unlocks access to one of the world’s largest liquid-cooled GPU clusters, giving AI teams the horsepower they need for demanding workloads.Whether you’re building a new AI-powered product or scaling an existing model, the IDN provides a clear path from development to production.Built for scale and performanceThe joint solution is built with the needs of enterprise customers in mind. It supports multi-tenant deployments, integrates with existing cloud-native tools, and prioritizes performance without sacrificing control. Customers gain the flexibility to deploy wherever and however they need, with enterprise-grade security and compliance baked in.Andre Reitenbach, CEO of Gcore, comments, “This collaboration supports Gcore’s mission to connect the world to AI anywhere and anytime. Together, we’re enabling the next generation of AI applications with low latency and massive scale.”“We are combining Northern Data’s heritage of HPC and Data Center infrastructure expertise, with Gcore’s specialization in software innovation and engineering.” says Aroosh Thillainathan, Founder and CEO of Northern Data Group. “This allows us to accelerate our vision of delivering software-enabled AI infrastructure across a globally distributed compute network. This is a key moment in time where the use of AI solutions is evolving, and we believe that this partnership will form a key part of it.”Deploy AI smarter and faster with Gcore and Northern Data GroupAI is the new foundation of digital business. Deploying it globally shouldn’t require a team of infrastructure engineers. With Gcore and Northern Data Group, enterprise teams get the tools and support they need to run AI at the edge at scale and at speed.No matter what you and your teams are trying to achieve with AI, the new Intelligence Delivery Network is built to help you deploy smarter and faster.Read the full press release

How to achieve compliance and security in AI inference

AI inference applications today handle an immense volume of confidential information, so prioritizing data privacy is paramount. Industries such as finance, healthcare, and government rely on AI to process sensitive data—detecting fraudulent transactions, analyzing patient records, and identifying cybersecurity threats in real time. While AI inference enhances efficiency, decision-making, and automation, neglecting security and compliance can lead to severe financial penalties, regulatory violations, and data breaches. Industries handling sensitive information—such as finance, healthcare, and government—must carefully manage AI deployments to avoid costly fines, legal action, and reputational damage.Without robust security measures, AI inference environments present a unique security challenge as they process real-time data and interact directly with users. This article explores the security challenges enterprises face and best practices for guaranteeing compliance and protecting AI inference workloads.Key inference security and compliance challengesAs businesses scale AI-powered applications, they will likely encounter challenges in meeting regulatory requirements, preventing unauthorized access, and making sure that AI models (whether proprietary or open source) produce reliable and unaltered outputs.Data privacy and sovereigntyRegulations such as GDPR (Europe), CCPA (California), HIPAA (United States, healthcare), and PCI DSS (finance) impose strict rules on data handling, dictating where and how AI models can be deployed. Businesses using public cloud-based AI models must verify that data is processed and stored in appropriate locations to avoid compliance violations.Additionally, compliance constraints restrict certain AI models in specific regions. Companies must carefully evaluate whether their chosen models align with regulatory requirements in their operational areas.Best practices:To maintain compliance and avoid legal risks:Deploy AI models in regionally restricted environments to keep sensitive data within legally approved jurisdictions.Use Smart Routing with edge inference to process data closer to its source, reducing cross-border security risks.Model security risksBad actors can manipulate AI models to produce incorrect outputs, compromising their reliability and integrity. This is known as adversarial manipulation, where small, intentional alterations to input data can deceive AI models. For example, researchers have demonstrated that minor changes to medical images can trick AI diagnostic models into misclassifying benign tumors as malignant. In a security context, attackers could exploit these vulnerabilities to bypass fraud detection in finance or manipulate AI-driven cybersecurity systems, leading to unauthorized transactions or undetected threats.To prevent such threats, businesses must implement strong authentication, encryption strategies, and access control policies for AI models.Best practices:To prevent adversarial attacks and maintain model integrity:Enforce strong authentication and authorization controls to limit access to AI models.Encrypt model inputs and outputs to prevent data interception and tampering.Endpoint protection for AI deploymentsThe security of AI inference does not stop at the model level. It also depends on where and how models are deployed.For private deployments, securing AI endpoints is crucial to prevent unauthorized access.For public cloud inference, leveraging CDN-based security can help protect workloads against cyber threats.Processing data within the country of origin can further reduce compliance risks while improving latency and security.AI models rely on low-latency, high-performance processing, but securing these workloads against cyber threats is as critical as optimizing performance. CDN-based security strengthens AI inference protection in the following ways:Encrypts model interactions with SSL/TLS to safeguard data transmissions.Implements rate limiting to prevent excessive API requests and automated attacks.Enhances authentication controls to restrict access to authorized users and applications.Blocks bot-driven threats that attempt to exploit AI vulnerabilities.Additionally, CDN-based security supports compliance by:Using Smart Routing to direct AI workloads to designated inference nodes, helping align processing with data sovereignty laws.Optimizing delivery and security while maintaining adherence to regional compliance requirements.While CDNs enhance security and performance by managing traffic flow, compliance ultimately depends on where the AI model is hosted and processed. Smart Routing allows organizations to define policies that help keep inference within legally approved regions, reducing compliance risks.Best practices:To protect AI inference environments from endpoint-related threats, you should:Deploy monitoring tools to detect unauthorized access, anomalies, and potential security breaches in real-time.Implement logging and auditing mechanisms for compliance reporting and proactive security tracking.Secure AI inference with Gcore Everywhere InferenceAI inference security and compliance are critical as businesses handle sensitive data across multiple regions. Organizations need a robust, security-first AI infrastructure to mitigate risks, reduce latency, and maintain compliance with data sovereignty laws.Gcore’s edge network and CDN-based security provide multi-layered protection for AI workloads, combining DDoS protection and WAAP (web application and API protection. By keeping inference closer to users and securing every stage of the AI pipeline, Gcore helps businesses protect data, optimize performance, and meet industry regulations.Explore Gcore AI Inference

Mobile World Congress 2025: the year of AI

As Mobile World Congress wrapped up for another year, it was apparent that only one topic was on everyone’s minds: artificial intelligence.Major players—such as Google, Ericsson, and Deutsche Telekom—showcased the various ways in which they’re piloting AI applications—from operations to infrastructure management and customer interactions. It’s clear there is a great desire to see AI move from the research lab into the real world, where it can make a real difference to people’s everyday lives. The days of more theoretical projects and gimmicky robots seem to be behind us: this year, it was all about real-world applications.MWC has long been an event for telecommunications companies to launch their latest innovations, and this year was no different. Telco companies demonstrated how AI is now essential in managing network performance, reducing operational downtime, and driving significant cost savings. The industry consensus is that AI is no longer experimental but a critical component of modern telecommunications. While many of the applications showcased were early-stage pilots and stakeholders are still figuring out what wide-scale, real-time AI means in practice, the ambition to innovate and move forward on adoption is clear.Here are three of the most exciting AI developments that caught our eye in Barcelona:Conversational AIChatbots were probably the key telco application showcased across MWC, with applications ranging from contact centers, in-field repairs, personal assistants transcribing calls, booking taxis and making restaurant reservations, to emergency responders using intelligent assistants to manage critical incidents. The easy-to-use, conversational nature of chatbots makes them an attractive means to deploy AI across functions, as it doesn’t require users to have any prior hands-on machine learning expertise.AI for first respondersEmergency responders often rely on telco partners to access novel, technology-enabled solutions to address their challenges. One such example is the collaboration between telcos and large language model (LLM) companies to deliver emergency-response chatbots. These tailored chatbots integrate various decision-making models, enabling them to quickly parse vast data streams and suggest actionable steps for human operators in real time.This collaboration not only speeds up response times during critical situations but also enhances the overall effectiveness of emergency services, ensuring that support reaches those in need faster.Another interesting example in this field was the Deutsche Telekom drone with an integrated LTE base station, which can be deployed in emergencies to deliver temporary coverage to an affected area or extend the service footprint during sports events and festivals, for example.Enhancing Radio Access Networks (RAN)Telecommunication companies are increasingly turning to advanced applications to manage the growing complexity of their networks and provide high-quality, uninterrupted service for their customers.By leveraging artificial intelligence, these applications can proactively monitor network performance, detect anomalies in real time, and automatically implement corrective measures. This not only enhances network reliability but reduces operational costs and minimizes downtime, paving the way for more efficient, agile, and customer-focused network management.One notable example was the Deutsche Telekom and Google Cloud collaboration: RAN Guardian. Built using Gemini 2.0, this agent analyzes network behavior, identifies performance issues, and takes corrective measures to boost reliability, lower operational costs, and improve customer experience.As telecom networks become more complex, conventional rule-based automation struggles to handle real-time challenges. In contrast, agentic AI employs large language models (LLMs) and sophisticated reasoning frameworks to create intelligent systems capable of independent thought, action, and learning.What’s next in the world of AI?The innovation on show at MWC 2025 confirms that AI is rapidly transitioning from a research topic to a fundamental component of telecom and enterprise operations.  Wide-scale AI adoption is, however, a balancing act between cost, benefit, and risk management.Telcos are global by design, operating in multiple regions with varying business needs and local regulations. Ensuring service continuity and a good return on investment from AI-driven applications while carefully navigating regional laws around data privacy and security is no mean feat.If you want to learn more about incorporating AI into your business operations, we can help.Gcore Everywhere Inference significantly simplifies large-scale AI deployments by providing a simple-to-use serverless inference tool that abstracts the complexity of AI hardware and allows users to deploy and manage AI inference globally with just a few clicks. It enables fully automated, auto-scalable deployment of inference workloads across multiple geographic locations, making it easier to handle fluctuating requirements, thus simplifying deployment and maintenance.Learn more about Gcore Everywhere Inference

Everywhere Inference updates: new AI models and enhanced product documentation

This month, we’re rolling out new features and updates to enhance AI model accessibility, performance, and cost-efficiency for Everywhere Inference. From new model options to updated product documentation, here’s what’s new in February.Expanding the model libraryWe’ve added several powerful models to Gcore Everywhere Inference, providing more options for AI inference and fine-tuning. This includes three DeepSeek R1 options, state-of-the-art open-weight models optimized for various NLP tasks.DeepSeek’s recent rise represents a major shift in AI accessibility and enterprise adoption. Learn more about DeepSeek’s rise and what it means for businesses in our dedicated blog. Or, explore what DeepSeek’s popularity means for Europe.The following new models are available now in our model library:QVQ-72B-Preview: A large-scale language model designed for advanced reasoning and language understanding.DeepSeek-R1-Distill-Qwen-14B: A distilled version of DeepSeek R1, providing a balance between efficiency and performance for language processing tasks.DeepSeek-R1-Distill-Qwen-32B: A more robust distilled model designed for enterprise-scale AI applications requiring high accuracy and inference speed.DeepSeek-R1-Distill-Llama-70B: A distilled version of Llama 70B, offering significant improvements in efficiency while maintaining strong performance in complex NLP tasks.Phi-3.5-MoE-instruct: A high-quality, reasoning-focused model supporting multilingual capabilities with a 128K context length.Phi-4: A 14-billion-parameter language model excelling in mathematics and advanced language processing.Mistral-Small-24B-Instruct-2501: A 24-billion-parameter model optimized for low-latency AI tasks, performing competitively with larger models.These additions give developers more flexibility in selecting the right models for their use cases, whether they require large-scale reasoning, multimodal capabilities, or optimized inference efficiency. The Gcore model library offers numerous popular models available at the click of a button, but you can also bring your own custom model just as easily.Everywhere Inference product documentationTo help you get the most out of Gcore Everywhere Inference, we’ve expanded our product documentation. Whether you’re deploying AI models, fine-tuning performance, or scaling inference workloads, our docs provide in-depth guidance, API references, and best practices for seamless AI deployment.Choose Gcore for intuitive, powerful AI deploymentWith these updates, Gcore Everywhere Inference continues to provide the latest and best in AI inference. If you need speed, efficiency, and flexibility, get in touch. We’d love to explore how we can support and enhance your AI workloads.Get a complimentary AI consultation

How to optimize ROI with intelligent AI deployment

As generative AI evolves, the cost of running AI workloads has become a pressing concern. A significant portion of these costs will come from inference—the process of applying trained AI models to real-world data to generate responses, predictions, or decisions. Unlike training, which occurs periodically, inference happens continuously, handling vast amounts of user queries and data in real-time. This persistent demand makes managing inference costs a critical challenge, as inefficiencies can gradually drive up expenses.Cost considerations for AI inferenceOptimizing AI inference isn’t just about improving performance—it’s also about controlling costs. Several factors influence the total expense of running AI models at scale, from the choice of hardware to deployment strategies. As businesses expand their AI capabilities, they must navigate the financial trade-offs between speed, accuracy, and infrastructure efficiency.Several factors contribute to inference costs:Compute costs: AI inference relies heavily on GPUs and specialized hardware. These resources are expensive, and as demand grows, so do the associated costs of maintaining and scaling them.Latency vs. cost trade-off: Real-time applications like recommendation systems or conversational AI require ultra-fast processing. Achieving low latency often demands premium resources, creating a challenging trade-off between performance and cost.Operational overheads: Managing inference at scale can lead to rising expenses, particularly as query volumes increase. While cloud-based inference platforms offer flexibility and scalability, it’s important to implement cost-control measures to avoid unnecessary overhead. Optimizing workload distribution and leveraging adaptive scaling can help mitigate these costs.Balancing performance, cost, and efficiency in AI deploymentThe AI marketplace is teeming with different options and configurations. This can make critical decisions about inference optimization, like model selection, infrastructure, and operational management, feel overwhelming and easy to get wrong. We recommend these key considerations when navigating the choices available:Selecting the right model sizeAI models range from massive foundational models to smaller, task-specific in-house solutions. While large models excel in complex reasoning and general-purpose tasks, smaller models can deliver cost-efficient, accurate results for specific applications. Finding the right balance often involves:Experimenting during the proof-of-concept (POC) phase to test different model sizes and accuracy levels.Prioritizing smaller models where possible without compromising task performance.Matching compute with task requirementsNot every workload requires the same level of computational power. By matching hardware resources to model and task requirements, businesses can significantly reduce costs while maintaining performance.Optimizing infrastructure for cost-effective inferenceInfrastructure plays a pivotal role in determining inference efficiency. Here are three emerging trends:Leveraging edge inference: Moving inference closer to the data source can minimize latency and reduce reliance on more expensive centralized cloud solutions. This approach can optimize costs and improve regulatory compliance for data-sensitive industries.Repatriating compute: Many businesses are moving away from hyperscalers—large cloud providers like AWS, Google Cloud, and Microsoft Azure—to local, in-country cloud providers for simplified compliance and often lower costs. This shift enables tighter cost control and can mitigate the unpredictable expenses often associated with cloud platforms.Dynamic inference management tools: Advanced monitoring tools help track real-time performance and spending, enabling proactive adjustments to optimize ROI.Building a sustainable AI futureGcore’s solutions are designed to help you achieve the ideal balance between cost, performance, and scalability. Here’s how:Smart workload routing: Gcore’s intelligent routing technology ensures workloads are processed at the most suitable edge location. While proximity to the user is prioritized for lower latency and compliance, this approach can also save cost by keeping inference closer to data sources.Per-minute billing and cost tracking: Gcore’s platform offers unparalleled budget control with granular per-minute billing. This transparency allows businesses to monitor and optimize their spending closely.Adaptive scaling: Gcore’s adaptive scaling capabilities allocate just the right amount of compute power needed for each workload, reducing resource waste without compromising performance.How Gcore enhances AI inference efficiencyAs AI adoption grows, optimizing inference efficiency becomes critical for sustainable deployment. Carefully balancing model size, infrastructure, and operational strategies can significantly enhance your ROI.Gcore’s Everywhere Inference solution provides a reliable framework to achieve this balance, delivering cost-effective, high-performance AI deployment at scale.Explore Everywhere Inference

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.