2. Getting Started
2.1 Platform Overview
Platform Components
Client Layer
Web Interface
Telegram Client
Mobile Responsive Design
Compute Layer
GPU Pool Management
Task Scheduler
Resource Manager
Result Validator
Blockchain Layer
Solana Smart Contracts
TON Integration
Token System
2.2 Creating an Account
Registration Process
Visit app.neurolov.ai
Choose registration method:
Email signup
Social login (Google, GitHub)
Telegram authentication
Account Verification
Email verification
Identity verification (if required)
Two-factor authentication setup (recommended)
2.3 Browser Requirements
Minimum Requirements
Modern web browser with WebGPU support
Chrome/Edge/Safari/FireFox (latest versions)
Stable internet connection
Hardware supporting WebGPU
Recommended Specifications
Chrome 94+ or Edge 94+
8GB RAM minimum
Dedicated GPU with updated drivers
50+ Mbps internet connection
2.4 Initial Setup Guide
Step 1: Account Configuration
Complete profile information
Set up security preferences
Configure notification settings
Connect wallet (optional)
Step 2: Platform Familiarization
Take platform tour
Review quick start guide
Explore dashboard features
Check available resources
Step 3: Resource Setup
Configure GPU sharing settings (if providing)
Set up earning preferences
Review and accept terms of service
Complete initial benchmarking
2.5 Understanding the Dashboard
Dashboard Components
Main Overview
Active tasks
Earnings display
Resource utilization
Network status
Quick Actions
Start/Stop computing
Access marketplace
Deploy models
View analytics
Performance Metrics
GPU utilization
Earnings rate
Network contribution
Task completion rate
2.6 Security Best Practices
Account Security
Strong Password Guidelines
Minimum 12 characters
Mix of characters
Regular updates
Two-Factor Authentication
App-based 2FA
SMS backup
Recovery codes
Access Management
Session monitoring
Device tracking
Login notifications
Transaction Security
Payment Protection
Secure payment channels
Transaction verification
Dispute resolution process
Data Protection
End-to-end encryption
Secure data storage
Privacy controls
Last updated
Was this helpful?