Brian Fitzgerald commited on
Commit
6f4bd66
1 Parent(s): f552176

Update README

Browse files
Files changed (1) hide show
  1. README.md +18 -19
README.md CHANGED
@@ -48,13 +48,20 @@ Please note: This model is released under the [Stability Community License](http
48
 
49
  ### License
50
 
51
- - **Community License:** Free for research, non-commercial, and commercial use for organizations or individuals with less than $1M in total annual revenue. More details can be found in the [Community License Agreement](https://stability.ai/community-license-agreement). Read more at https://stability.ai/license.
52
- - **For individuals and organizations with annual revenue above $1M**: please [contact us](https://stability.ai/enterprise) to get an Enterprise License.
 
 
 
 
 
53
 
54
  ## Usage
55
 
56
  For now, we recommend using the [standalone SD3.5 repo](https://github.com/Stability-AI/sd3.5) to use the ControlNets.
57
 
 
 
58
  A full technical report on Stable Diffusion 3.5, with details on the ControlNet training, will be released soon as well.
59
 
60
  ### Using Controlnets in SD3.5 Standalone Repo
@@ -98,42 +105,34 @@ img = cv2.Canny(img, 100, 200)
98
  ```
99
 
100
  ### Tips
101
- - Euler sampler and a slightly higher step count (50-60) gives best results, especially with Canny.
 
102
  - Pass `--text_encoder_device <device_name>` to load the text encoders directly to VRAM, which can speed up the full inference loop at the cost of extra VRAM usage.
103
 
104
  ## Uses
105
 
106
- ### Intended Uses
107
 
108
- Intended uses include the following:
109
- * Generation of artworks and use in design and other artistic processes.
110
- * Applications in educational or creative tools.
111
- * Research on generative models, including understanding the limitations of generative models.
112
 
113
- All uses of the model must be in accordance with our [Acceptable Use Policy](https://stability.ai/use-policy).
114
 
115
  ### Training Data and Strategy
116
 
117
  These models were trained on a wide variety of data, including synthetic data and filtered publicly available data.
118
- The data used is a subset of the Stable Diffusion 3.5 post-training dataset, and satisfies the same legal and safety requirements.
119
-
120
- ### Out-of-Scope Uses
121
-
122
- The model was not trained to be factual or true representations of people or events. As such, using the model to generate such content is out-of-scope of the abilities of this model.
123
 
124
  ## Safety
125
 
126
- As part of our safety-by-design and responsible AI deployment approach, we take deliberate measures to ensure Integrity starts at the early stages of development. We implement safety measures throughout the development of our models. We have implemented safety mitigations that are intended to reduce the risk of certain harms, however we recommend that developers conduct their own testing and apply additional mitigations based on their specific use cases.
127
- For more about our approach to Safety, please visit our [Safety page](https://stability.ai/safety).
128
 
129
  ### Integrity Evaluation
130
 
131
- Our integrity evaluation methods include structured evaluations and red-teaming testing for certain harms. Testing was conducted primarily in English and may not cover all possible harms.
132
 
133
  ### Risks identified and mitigations:
134
 
135
- * Harmful content: We have used filtered data sets when training our models and implemented safeguards that attempt to strike the right balance between usefulness and preventing harm. However, this does not guarantee that all possible harmful content has been removed. All developers and deployers should exercise caution and implement content safety guardrails based on their specific product policies and application use cases.
136
- * Misuse: Technical limitations and developer and end-user education can help mitigate against malicious applications of models. All users are required to adhere to our [Acceptable Use Policy](https://stability.ai/use-policy), including when applying fine-tuning and prompt engineering mechanisms. Please reference the Stability AI Acceptable Use Policy for information on violative uses of our products.
137
  * Privacy violations: Developers and deployers are encouraged to adhere to privacy regulations with techniques that respect data privacy.
138
 
139
  ### Acknowledgements
 
48
 
49
  ### License
50
 
51
+ Here are the key components of the license:
52
+ * Free for non-commercial use: Individuals and organizations can use the model free of charge for non-commercial use, including scientific research.
53
+ * Free for commercial use (up to $1M in annual revenue): Startups, small to medium-sized businesses, and creators can use the model for commercial purposes at no cost, as long as their total annual revenue is less than $1M.
54
+ * Ownership of outputs: Retain ownership of the media generated without restrictive licensing implications.
55
+
56
+ For organizations with annual revenue more than $1M, please contact us [here](https://stability.ai/enterprise) to inquire about an Enterprise License.
57
+
58
 
59
  ## Usage
60
 
61
  For now, we recommend using the [standalone SD3.5 repo](https://github.com/Stability-AI/sd3.5) to use the ControlNets.
62
 
63
+ **Support in [ComfyUI](https://github.com/comfyanonymous/ComfyUI) and [🧨 Diffusers](https://github.com/huggingface/diffusers) is planned, and will be available very soon.**
64
+
65
  A full technical report on Stable Diffusion 3.5, with details on the ControlNet training, will be released soon as well.
66
 
67
  ### Using Controlnets in SD3.5 Standalone Repo
 
105
  ```
106
 
107
  ### Tips
108
+ - We recommend starting with a ControlNet strength of 0.8, and adjusting as needed.
109
+ - Euler sampler and a slightly higher step count (50-60) gives best results.
110
  - Pass `--text_encoder_device <device_name>` to load the text encoders directly to VRAM, which can speed up the full inference loop at the cost of extra VRAM usage.
111
 
112
  ## Uses
113
 
114
+ All uses of the model must be in accordance with our [Acceptable Use Policy](https://stability.ai/use-policy).
115
 
116
+ ### Out-of-Scope Uses
 
 
 
117
 
118
+ The model was not trained to be factual or true representations of people or events. As such, using the model to generate such content is out-of-scope of the abilities of this model.
119
 
120
  ### Training Data and Strategy
121
 
122
  These models were trained on a wide variety of data, including synthetic data and filtered publicly available data.
 
 
 
 
 
123
 
124
  ## Safety
125
 
126
+ We believe in safe, responsible AI practices and take deliberate measures to ensure Integrity starts at the early stages of development. This means we have taken and continue to take reasonable steps to prevent the misuse of Stable Diffusion 3.5 by bad actors. For more information about our approach to Safety please visit our [Safety page](https://stability.ai/safety).
 
127
 
128
  ### Integrity Evaluation
129
 
130
+ Our integrity evaluation methods include structured evaluations and red-teaming testing for certain harms. Testing was conducted primarily in English and may not cover all possible harms.
131
 
132
  ### Risks identified and mitigations:
133
 
134
+ * Harmful content: We have used filtered data sets when training our models and implemented safeguards that attempt to strike the right balance between usefulness and preventing harm. However, this does not guarantee that all possible harmful content has been removed. All developers and deployers should exercise caution and implement content safety guardrails based on their specific product policies and application use cases.
135
+ * Misuse: Technical limitations and developer and end-user education can help mitigate against malicious applications of models. All users are required to adhere to our Acceptable Use Policy, including when applying fine-tuning and prompt engineering mechanisms. Please reference the Stability AI Acceptable Use Policy for information on violative uses of our products.
136
  * Privacy violations: Developers and deployers are encouraged to adhere to privacy regulations with techniques that respect data privacy.
137
 
138
  ### Acknowledgements