text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים
Banner Image

Document Library

Reference architectures, white papers, and solutions briefs to help build and enhance your network infrastructure, at any level of deployment.

Related Content

Intel® Deep Learning Boost - Improve Inference Performance of BERT Base Model from Hugging Face for Network Security Technology Guide

Last Updated: Jan 10, 2023

PyTorch* is one of the widely used deep-learning frameworks. To boost the performance under Intel® hardware, Intel provides the open-source Intel® Extension for PyTorch* (IPEX) with latest feature optimizations. This guide illustrates how to use PyTorch and Intel IPEX tool to boost deep-learning inference performance on Hugging Face BERT base model (cased). The guide also shows a gen-2-gen performance comparison between the 3rd Gen Intel® Xeon® Scalable processor and the 4th Gen Intel® Xeon® Scalable processor.

Download PDF

Your browser does not support PDFs. Download the PDF.

Categories
Categories - Open Source Solutions Intel Technologies and Platforms - 3rd gen Intel Xeon Scalable processor Intel Technologies and Platforms - 4th gen Intel Xeon Scalable processor Intel Technologies and Platforms - Accelerators Network Location - Core Network Network Location - Data Center Network Location - Hybrid Cloud Network Location - On Premises Network Technologies - AI and Automation Network Technologies - Network Edge Network Technologies - Network Security Network Technologies - SD-WAN/uCPE Optimizations - IPEX Verticals/Industries - Cloud Service Providers Verticals/Industries - Enterprise Verticals/Industries - Industrial Verticals/Industries - Telecommunications VNFS and CNFs - Wide Area Network (WAN) Optimization Workloads and Use cases - Artificial Intelligence (AI) Workloads and Use cases - SD-WAN and uCPE Workloads and Use cases - Secure Access Service Edge (SASE) Workloads and Use cases - Security