license: other
WARNING: This is an intermediary checkpoint. It is not fully trained yet. You might want to use Bloom-1B3 if you want a model that has completed training.
BLOOM LM
BigScience Large Open-source Open-access Multilingual Language Model
Model Card
BigScience Large Open-source Open-access Multilingual Language Model
Model Card
Version 1.0 / 23.May.2022
Table of Contents
- Model Details
- Uses
- Training Data
- Risks and Limitations
- Evaluation
- Recommendations
- Glossary and Calculations
- Model Card Authors
Model Details
Basics
This section provides information for anyone who wants to know about the model.
Click to expand
Developed by: BigScience
- All collaborators are either volunteers or have an agreement with their employer. [Further breakdown of participants forthcoming.]
Model Type: Transformer-based Language Model
Version: 1.0.0
Languages: Multiple; see training data.
License: RAIL License v1.0
Released: [Forthcoming]
Send questions to: bigscience-contact@googlegroups.com
Cite as: BigScience Workshop, BigScience Language Open-source Open-access Multilingual (BLOOM). International, May 2021-May 2022.
Funded by: The French government, Hugging Face, and the organizations of contributors. [Further breakdown of organizations forthcoming.]
Technical Specifications
This section provides information for people who work on model development.
Click to expand
Please see the BLOOM training README for full details.
Model Architecture: Modified from Megatron-LM GPT2 (paper link):
Layer normalization applied to word embedding layer
Objective Function: Cross Entropy with mean reduction
Number of Parameters: 350M parameters; 24 layers, 16 attention heads
Infrastructure
Compute Infrastructure: Jean Zay Public Supercomputer, provided by the French government
Hardware: 384 A100 80GB GPUs (48 nodes)
Additional 32 A100 80GB GPUs (4 nodes) in reserve
8 GPUs per node Using NVLink 4 inter-gpu connects, 4 OmniPath links
CPU: AMD
CPU memory: 512GB per node
GPU memory: 640GB per node
Inter-node connect: Omni-Path Architecture (OPA)
NCCL-communications network: a fully dedicated subnet
Disc IO network: shared network with other types of nodes
Software:
Megatron-DeepSpeed, BigScience fork
PyTorch-1.11 w/ CUDA-11.5
Training
In progress.
Checkpoint size:
- fp16 weights: 1.04GB
Training throughput: About 150 TFLOP per GPU per second
Number of steps: 555750
Dates:
- Started: to determine
- Ended: to determine
Estimated cost of training: Unknown
Server training location: Ile-de-France, France
Environmental Impact
Click to expand
[More forthcoming when training has completed.]
The training supercomputer, Jean Zay, uses mostly nuclear energy.
The heat generated by it is reused for heating campus housing.
Estimated carbon emissions: [Forthcoming]
Estimated electricity usage: [Forthcoming]
Uses
This section addresses questions around how the model is intended to be used, discusses the foreseeable users of the model (including those affected by the model), and describes uses that are considered out of scope or misuse of the model. It provides information for anyone considering using the model, or who is affected by the model.
Click to expand
Intended use
This model is being created in order to enable public research on large language models (LLMs). LLMs are intended to be used for language generation or as a pretrained base model that can be further fine-tuned for specific tasks. Use cases below are not exhaustive.
Direct Use
Text generation
Exploring characteristics of language generated by a language model.
- Examples: Cloze tests, counterfactuals, generations with reframings.
Downstream Use
- Tasks that leverage language models include: Information Extraction, Question Answering, Summarization.
Misuse and Out-of-scope Use
This section addresses what users ought not do with the model.
See the LLM LICENSE , Attachment A, for detailed usage restrictions. The below list is non-exhaustive, but lists some easily foreseeable problematic use cases.
Out-of-scope Uses
Using the model in high-stakes settings is out of scope for this model. The model is not designed for critical decisions nor uses with any material consequences on an individual's livelihood or wellbeing. The model outputs content that appears factual but is not correct.
Out-of-scope uses include:
Usage in biomedical domains, political and legal domains, or finance domains.
Usage for evaluating or scoring individuals, such as for employment, education, or credit.
Applying the model for critical automatic decisions, generating factual content, creating reliable summaries, or generating predictions that must be correct.
Misuse
Intentionally using the model for harm, violating rights, or other kinds of malicious activities is a misuse of this model. This includes:
Spam generation
Disinformation and influence operations
Disparagement and defamation
Harassment and abuse
Deception
Unconsented impersonation and imitation
Unconsented surveillance
Generating content without attribution to the model, as specified in the RAIL License, Use Restrictions.
Intended Users
Direct Users
General Public
Researchers
Students
Educators
Engineers/developers
Non-commercial entities
Community advocates, including human and civil rights groups
Indirect Users
Users of derivatives created by Direct Users, such as those using software with an intended use.
Users of Derivatives of the Model, as described in the License.
Others Affected (Parties prenantes)
People and groups referred to by the LLM
People and groups exposed to outputs of, or decisions based on, the LLM
People and groups whose original work is included in the LLM
Training Data
This section provides a high-level overview of the training data. It is relevant for anyone who wants to know the basics of what the model is learning.
Click to expand
Details for each dataset are provided in individual Data Cards.
Training data includes:
45 natural languages.
12 programming languages.
In 1.5TB of pre-processed text, converted into 350B unique tokens.
See the Model README, Datasets for more.
Languages
The pie chart shows the distribution of languages in training data.
The following table shows the further distribution of Niger-Congo and Indic languages in the training data.
Click to expand
Niger Congo | Percentage | Indic | Percentage | |
---|---|---|---|---|
Chi Tumbuka | 0.00002 | Assamese | 0.01 | |
Kikuyu | 0.00004 | Odia | 0.04 | |
Bambara | 0.00004 | Gujarati | 0.04 | |
Akan | 0.00007 | Marathi | 0.05 | |
Xitsonga | 0.00007 | Punjabi | 0.05 | |
Sesotho | 0.00007 | Kannada | 0.06 | |
Chi Chewa | 0.0001 | Nepali | 0.07 | |
Setswana | 0.0002 | Telugu | 0.09 | |
Northern Sotho | 0.0002 | Malayalam | 0.10 | |
Fon | 0.0002 | Urdu | 0.10 | |
Kirundi | 0.0003 | Tamil | 0.20 | |
Wolof | 0.0004 | Bengali | 0.50 | |
Kuganda | 0.0004 | Hindi | 0.70 | |
Chi Shona | 0.001 | |||
Isi Zulu | 0.001 | |||
Igbo | 0.001 | |||
Xhosa | 0.001 | |||
Kinyarwanda | 0.003 | |||
Yoruba | 0.006 | |||
Swahili | 0.02 |
The following table shows the distribution of programming languages.
Click to expand
Extension | Language | Number of files |
---|---|---|
java | Java | 5,407,724 |
php | PHP | 4,942,186 |
cpp | C++ | 2,503,930 |
py | Python | 2,435,072 |
js | JavaScript | 1,905,518 |
cs | C# | 1,577,347 |
rb | Ruby | 6,78,413 |
cc | C++ | 443,054 |
hpp | C++ | 391,048 |
lua | Lua | 352,317 |
go | GO | 227,763 |
ts | TypeScript | 195,254 |
C | C | 134,537 |
scala | Scala | 92,052 |
hh | C++ | 67,161 |
H | C++ | 55,899 |
tsx | TypeScript | 33,107 |
rs | Rust | 29,693 |
phpt | PHP | 9,702 |
c++ | C++ | 1,342 |
h++ | C++ | 791 |
php3 | PHP | 540 |
phps | PHP | 270 |
php5 | PHP | 166 |
php4 | PHP | 29 |
Risks and Limitations
This section identifies foreseeable harms and misunderstandings.
Click to expand
Model may:
Overrepresent some viewpoints and underrepresent others
Contain stereotypes
Contain personal information
Generate:
Hateful, abusive, or violent language
Discriminatory or prejudicial language
Content that may not be appropriate for all settings, including sexual content.
Make errors, including producing incorrect information as if it were factual.
Generate irrelevant or repetitive outputs.
Evaluation
Click to expand
Metrics
This section describes the different ways performance is calculated, and why.
[More Forthcoming]
Includes:
Metric | Why chosen |
---|---|
F1 | Standard for benchmarking |
Accuracy | Standard for benchmarking |
Perplexity | Standard metric for quantifying model improvements during training |
Cross Entropy Loss | Standard objective for language models |
And multiple different metrics for specific tasks.
Factors
This section lists some different aspects of what BLOOM models. Its focus is on those aspects that are likely to give rise to high variance in model behavior.
- Language, such as English or Yoruba
- Domain, such as newswire or stories
- Demographic characteristics, such as gender or nationality
Results
Results are based on the Factors and Metrics.
Train-time evaluation:
As of 19.May.2022, 18:00:
Training Loss: 2.04
Validation Loss: 2.21
Perplexity: 9.15
[More evaluation types forthcoming at the end of model training.]
Recommendations
This section provides information on warnings and potential mitigations.
Click to expand
Indirect users should be made aware when the content they're working with is created by the LLM.
Users should be aware of Risks and Limitations, and include an appropriate age disclaimer or blocking interface as necessary.
Models pre-trained with the LLM should include an updated Model Card.
Users of the model should provide mechanisms for those affected to provide feedback, such as an email address for comments.
Glossary and Calculations
This section defines common terms and how metrics are calculated.
Click to expand
Loss: A calculation of the difference between what the model has learned and what the data shows ("groundtruth"). The lower the loss, the better. The training process aims to minimize the loss.
Perplexity: This is based on what the model estimates the probability of new data is. The lower the perplexity, the better. If the model is 100% correct at predicting the next token it will see, then the perplexity is 1. Mathematically this is calculated using entropy.
High-stakes settings: Such as those identified as "high-risk AI systems" and "unacceptable risk AI systems" in the European Union's proposed Artificial Intelligence (AI) Act.
Critical decisions: Such as those defined in the United States' proposed Algorithmic Accountability Act.
Human Rights: Includes those rights defined in the Universal Declaration of Human Rights.
Personal Data and Information: Personal data and information is defined in multiple data protection regulations, such as "personal data" in the European Union's General Data Protection Regulation; and "personal information" in the Republic of South Africa's Protection of Personal Information Act, The People's Republic of China's Personal information protection law.
Sensitive Characteristics: This includes specifically protected categories in human rights (see UHDR, Article 2) and personal information regulation (see GDPR, Article 9; Protection of Personal Information Act, Chapter 1)
Deception: Doing something to intentionally mislead individuals to believe something that is false, such as by creating deadbots or chatbots on social media posing as real people, or generating text documents without making consumers aware that the text is machine generated.
Model Card Authors
Ordered roughly chronologically and by amount of time spent.
Margaret Mitchell, Giada Pistilli, Yacine Jernite, Ezinwanne Ozoani, Marissa Gerchick, Nazneen Rajani, Sasha Luccioni, Irene Solaiman, Maraim Masoud, Somaieh Nikpoor, Carlos Muñoz Ferrandis, Stas Bekman, Danish Contractor, David Lansky, Angelina McMillan-Major, Tristan Thrush, Suzana Ilić, Gérard Dupont, Shayne Longpre, Manan Dey, Stella Biderman, Douwe Kiela, Emi Baylor, Teven Le Scao, Aaron Gokaslan, Julien Launay