category
stringclasses 8
values | messages
listlengths 2
2
| prompt
stringlengths 5
23.6k
|
---|---|---|
classification | [
{
"content": "Classify each of these car manufacturers as either French, German, American, Japanese, or other: Audi, Peugeot, Aston Martin, Ssangyong, Chevrolet, BMW",
"role": "user"
},
{
"content": "French: Peugeot\nGerman: Audi, BMW\nAmerican: Chevrolet\nJapanese:\nother: Aston Martin, Ssangyong",
"role": "assistant"
}
]
| Classify each of these car manufacturers as either French, German, American, Japanese, or other: Audi, Peugeot, Aston Martin, Ssangyong, Chevrolet, BMW |
classification | [
{
"content": "Identify which instrument is string or percussion: Cuica, Kokles",
"role": "user"
},
{
"content": "Kokles is string, Cuica is percussion.",
"role": "assistant"
}
]
| Identify which instrument is string or percussion: Cuica, Kokles |
brainstorming | [
{
"content": "Is Killing is Sin ? Is it ture",
"role": "user"
},
{
"content": "Killing a human being should not be sin because same goes to any animal. So either both are sin or any one of it is not should not be accepted.",
"role": "assistant"
}
]
| Is Killing is Sin ? Is it ture |
general_qa | [
{
"content": "What and how should you feed your baby?",
"role": "user"
},
{
"content": "What to feed your baby depends on a number of factors ranging from their age, their health and your preferences. Typically, until your baby is 6 months old, their diet consists exclusively of breast milk or formula. Around 6 months old your baby may be able to start solids. You should consult your physician before modifying the diet of your baby. Some people choose to introduce solids with soft, mushy and simple foods like mashed bananas, avocados or rice cereal. Others will introduce whatever food is being served to the adults — this could be complex foods with spices such as fajitas, curries and hamburgers. Although young babies will rarely have teeth, their gums are very hard and can mash food. For example, a common early food is mini cucumber, which also may alleviate pains with teething. For how to feed your baby, there are two main categories with many variations in between 1/ Baby-led weaning 2/ Spoon fed. Baby-led does what it sounds like — the baby leads their own feeding. This is often done by the caregiver laying out a few foods (Soft, Mashable, Age-appropriate and safe — void of choking hazards) and letting the baby choose which foods to pick up and eat and how much. Spoon-fed means the caregiver is selecting the foods and feeding the baby. There is no right or wrong way to feed your baby. Consult a physician for tips and safety recommendations.",
"role": "assistant"
}
]
| What and how should you feed your baby? |
information_extraction | [
{
"content": "The North Atlantic Treaty Organization (NATO, /ˈneɪtoʊ/; French: Organisation du traité de l'Atlantique nord, OTAN), also called the North Atlantic Alliance, is an intergovernmental military alliance between 31 member states – 29 European and two North American. Established in the aftermath of World War II, the organization implemented the North Atlantic Treaty, signed in Washington, D.C., on 4 April 1949. NATO is a collective security system: its independent member states agree to defend each other against attacks by third parties. During the Cold War, NATO operated as a check on the perceived threat posed by the Soviet Union. The alliance remained in place after the dissolution of the Soviet Union and has been involved in military operations in the Balkans, the Middle East, South Asia, and Africa. The organization's motto is animus in consulendo liber (Latin for \"a mind unfettered in deliberation\").\n\nNATO's main headquarters are located in Brussels, Belgium, while NATO's military headquarters are near Mons, Belgium. The alliance has targeted its NATO Response Force deployments in Eastern Europe, and the combined militaries of all NATO members include around 3.5 million soldiers and personnel. Their combined military spending as of 2020 constituted over 57 percent of the global nominal total. Moreover, members have agreed to reach or maintain the target defence spending of at least two percent of their GDP by 2024.\n\nNATO formed with twelve founding members and has added new members nine times, most recently when Finland joined the alliance in April 2023. Following the acceptance of its application for membership in June 2022, Sweden is anticipated to become the 32nd member, with its Accession Protocol to the North Atlantic Treaty now in the process of being ratified by the existing members. In addition, NATO currently recognizes Bosnia and Herzegovina, Georgia, and Ukraine as aspiring members. Enlargement has led to tensions with non-member Russia, one of the twenty additional countries participating in NATO's Partnership for Peace programme. Another nineteen countries are involved in institutionalized dialogue programmes with NATO. List all the aspiring members of NATO.",
"role": "user"
},
{
"content": "Bosnia and Herzegovina, Georgia, and Ukraine",
"role": "assistant"
}
]
| The North Atlantic Treaty Organization (NATO, /ˈneɪtoʊ/; French: Organisation du traité de l'Atlantique nord, OTAN), also called the North Atlantic Alliance, is an intergovernmental military alliance between 31 member states – 29 European and two North American. Established in the aftermath of World War II, the organization implemented the North Atlantic Treaty, signed in Washington, D.C., on 4 April 1949. NATO is a collective security system: its independent member states agree to defend each other against attacks by third parties. During the Cold War, NATO operated as a check on the perceived threat posed by the Soviet Union. The alliance remained in place after the dissolution of the Soviet Union and has been involved in military operations in the Balkans, the Middle East, South Asia, and Africa. The organization's motto is animus in consulendo liber (Latin for "a mind unfettered in deliberation").
NATO's main headquarters are located in Brussels, Belgium, while NATO's military headquarters are near Mons, Belgium. The alliance has targeted its NATO Response Force deployments in Eastern Europe, and the combined militaries of all NATO members include around 3.5 million soldiers and personnel. Their combined military spending as of 2020 constituted over 57 percent of the global nominal total. Moreover, members have agreed to reach or maintain the target defence spending of at least two percent of their GDP by 2024.
NATO formed with twelve founding members and has added new members nine times, most recently when Finland joined the alliance in April 2023. Following the acceptance of its application for membership in June 2022, Sweden is anticipated to become the 32nd member, with its Accession Protocol to the North Atlantic Treaty now in the process of being ratified by the existing members. In addition, NATO currently recognizes Bosnia and Herzegovina, Georgia, and Ukraine as aspiring members. Enlargement has led to tensions with non-member Russia, one of the twenty additional countries participating in NATO's Partnership for Peace programme. Another nineteen countries are involved in institutionalized dialogue programmes with NATO. List all the aspiring members of NATO. |
classification | [
{
"content": "Classify each of the following as either a state or a city",
"role": "user"
},
{
"content": "Virginia, Houston, Florida, Los Angeles, Chicago, Phoenix, California",
"role": "assistant"
}
]
| Classify each of the following as either a state or a city |
open_qa | [
{
"content": "Who was the first country to win the cricket world cup in their home soil",
"role": "user"
},
{
"content": "India was the first country to win Cricket World Cup on home soil in 2011.The Indian cricket team are two times World Champions they also won the 1983 Cricket World Cup beating then world champion West Indies.",
"role": "assistant"
}
]
| Who was the first country to win the cricket world cup in their home soil |
closed_qa | [
{
"content": "The Hatfield–McCoy feud, also described by journalists as the Hatfield–McCoy conflict, involved two rural American families of the West Virginia–Kentucky area along the Tug Fork of the Big Sandy River in the years 1863–1891. The Hatfields of West Virginia were led by William Anderson \"Devil Anse\" Hatfield, while the McCoys of Kentucky were under the leadership of Randolph \"Ole Ran'l\" McCoy. Those involved in the feud were descended from Joseph Hatfield and William McCoy (born c. 1750). The feud has entered the American folklore lexicon as a metonym for any bitterly feuding rival parties. From the following description of the Hatfield-McCoy feud, identify the person condidered the leader of the Hatfields.",
"role": "user"
},
{
"content": "William Anderson Hatfield, also known as \"Devil Anse\", was considered the leader of the Hatfield clan.",
"role": "assistant"
}
]
| The Hatfield–McCoy feud, also described by journalists as the Hatfield–McCoy conflict, involved two rural American families of the West Virginia–Kentucky area along the Tug Fork of the Big Sandy River in the years 1863–1891. The Hatfields of West Virginia were led by William Anderson "Devil Anse" Hatfield, while the McCoys of Kentucky were under the leadership of Randolph "Ole Ran'l" McCoy. Those involved in the feud were descended from Joseph Hatfield and William McCoy (born c. 1750). The feud has entered the American folklore lexicon as a metonym for any bitterly feuding rival parties. From the following description of the Hatfield-McCoy feud, identify the person condidered the leader of the Hatfields. |
information_extraction | [
{
"content": "Breaking Bad is an American neo-Western crime drama television series created and produced by Vince Gilligan for AMC. Set and filmed in Albuquerque, New Mexico, the series follows Walter White (Bryan Cranston), an underpaid, overqualified, and dispirited high-school chemistry teacher who is struggling with a recent diagnosis of stage-three lung cancer. White turns to a life of crime and partners with a former student, Jesse Pinkman (Aaron Paul), to produce and distribute methamphetamine to secure his family's financial future before he dies, while navigating the dangers of the criminal underworld. Breaking Bad premiered on AMC on January 20, 2008, and concluded on September 29, 2013, after five seasons consisting of 62 episodes. What is \"Breaking Bad\"?",
"role": "user"
},
{
"content": "Breaking Bad is an American neo-Western crime drama television series created and produced by Vince Gilligan for AMC. Set and filmed in Albuquerque, New Mexico, the series follows Walter White (Bryan Cranston), an underpaid, overqualified, and dispirited high-school chemistry teacher who is struggling with a recent diagnosis of stage-three lung cancer. White turns to a life of crime and partners with a former student, Jesse Pinkman (Aaron Paul), to produce and distribute methamphetamine to secure his family's financial future before he dies, while navigating the dangers of the criminal underworld. Breaking Bad premiered on AMC on January 20, 2008, and concluded on September 29, 2013, after five seasons consisting of 62 episodes.\n\nAmong the show's co-stars are Anna Gunn and RJ Mitte as Walter's wife Skyler and son Walter Jr., and Betsy Brandt and Dean Norris as Skyler's sister Marie Schrader and her husband Hank, a DEA agent. Others include Bob Odenkirk as Walter's and Jesse's lawyer Saul Goodman, Jonathan Banks as private investigator and fixer Mike Ehrmantraut, and Giancarlo Esposito as drug kingpin Gus Fring. The final season introduces Jesse Plemons as the criminally ambitious Todd Alquist, and Laura Fraser as Lydia Rodarte-Quayle, a cunning business executive secretly managing Walter's global meth sales for her company.\n\nBreaking Bad's first season received generally positive reviews, while the rest of its run received unanimous critical acclaim, with praise for the performances, direction, cinematography, screenplay, story, and character development. Since its conclusion, the show has been lauded by critics as one of the greatest television series of all time. It had fair viewership in its first three seasons, but the fourth and fifth seasons saw a moderate rise in viewership when it was made available on Netflix just before the fourth season premiere. Viewership increased more drastically upon the premiere of the second half of the fifth season in 2013. By the time that the series finale aired, it was among the most-watched cable shows on American television. The show received numerous awards, including 16 Primetime Emmy Awards, eight Satellite Awards, two Golden Globe Awards, two Peabody Awards, two Critics' Choice Awards, and four Television Critics Association Awards. Cranston won the Primetime Emmy Award for Outstanding Lead Actor in a Drama Series four times, while Aaron Paul won the Primetime Emmy Award for Outstanding Supporting Actor in a Drama Series three times; Anna Gunn won the Primetime Emmy Award for Outstanding Supporting Actress in a Drama Series twice. In 2013, Breaking Bad entered the Guinness World Records as the most critically acclaimed TV show of all time.\n\nThe series gave rise to the larger Breaking Bad franchise. Better Call Saul, a prequel series featuring Odenkirk, Banks, and Esposito reprising their Breaking Bad roles, as well as many others in guest and recurring appearances, debuted on AMC on February 8, 2015, and concluded on August 15, 2022. A sequel film, El Camino: A Breaking Bad Movie, starring Paul was released on Netflix and in theaters on October 11, 2019.",
"role": "assistant"
}
]
| Breaking Bad is an American neo-Western crime drama television series created and produced by Vince Gilligan for AMC. Set and filmed in Albuquerque, New Mexico, the series follows Walter White (Bryan Cranston), an underpaid, overqualified, and dispirited high-school chemistry teacher who is struggling with a recent diagnosis of stage-three lung cancer. White turns to a life of crime and partners with a former student, Jesse Pinkman (Aaron Paul), to produce and distribute methamphetamine to secure his family's financial future before he dies, while navigating the dangers of the criminal underworld. Breaking Bad premiered on AMC on January 20, 2008, and concluded on September 29, 2013, after five seasons consisting of 62 episodes. What is "Breaking Bad"? |
brainstorming | [
{
"content": "Name few motivation tips and techniques for learning",
"role": "user"
},
{
"content": "Set clear goals: Provide someone with clear and specific goals that are challenging but achievable. This can give them a sense of purpose and direction, and help them stay focused on what they need to accomplish.\n\nOffer feedback and recognition: Regularly provide feedback and recognition to let someone know that their efforts are noticed and appreciated. This can help boost their confidence and morale, and motivate them to continue performing at a high level.\n\nProvide opportunities for growth and development: Offer someone opportunities to learn new skills, take on new challenges, and grow professionally. This can help them stay engaged and motivated, and feel like they are progressing in their career.\n\nCreate a positive work environment: Foster a positive work environment that is supportive, collaborative, and respectful. This can help someone feel valued and connected to their work, and motivated to contribute to the team's success.\n\nProvide autonomy and trust: Give someone the autonomy and trust they need to make decisions and take ownership of their work. This can help them feel empowered and invested in their work, and motivated to take on new challenges.\n\nOffer incentives and rewards: Provide someone with incentives and rewards, such as bonuses, promotions, or other perks, to recognize and reward their hard work and achievements.\n\nEncourage teamwork and collaboration: Foster a culture of teamwork and collaboration, where people are encouraged to work together and support one another. This can help build camaraderie and motivation, and create a sense of shared purpose.",
"role": "assistant"
}
]
| Name few motivation tips and techniques for learning |
open_qa | [
{
"content": "What is the difference between a resume and a cv?",
"role": "user"
},
{
"content": "The CV presents a complete history of various credentials like, academic, professional career, training, etc., so the length of the document can vary in some instances. In contrast, a resume is much more concise and primarily highlights specific skills and relevant qualifications for the particular job application. Henceforth, the length of the resume is relatively short.",
"role": "assistant"
}
]
| What is the difference between a resume and a cv? |
closed_qa | [
{
"content": "Lester D. Menke (December 16, 1918 – March 5, 2016) was a state Representative from the Iowa's 5th and 7th Districts. He served in the Iowa House of Representatives from 1973 to 1985, serving as Speaker pro Tempore from 1981 to 1985. After he served in the Iowa House, Menke served as a liaison between Governor Terry Branstad and the legislature for two years. Menke has a B.A. from Morningside College, where he later served as a member of the board of directors, and attended The University of Iowa College of Law for one year. He worked as a farm owner and for an insurance agency. He served on various school boards and served as president of the Iowa Association of School Boards and State Board of Public Instruction and as director of the National Association of State Boards of Education, as well as serving on the Iowa Educational Radio and Television Facilities Board. Menke received Morningside College's Distinguished Alumni award in 1975. Who was Lester Menke",
"role": "user"
},
{
"content": "Lester D. Menke (December 16, 1918 – March 5, 2016) was a state Representative from the Iowa's 5th and 7th Districts. He served in the Iowa House of Representatives from 1973 to 1985, serving as Speaker pro Tempore from 1981 to 1985. \n\nAfter he served in the Iowa House, Menke served as a liaison between Governor Terry Branstad and the legislature for two years. Menke has a B.A. from Morningside College, where he later served as a member of the board of directors, and attended The University of Iowa College of Law for one year. He worked as a farm owner and for an insurance agency.\n\nHe served on various school boards and served as president of the Iowa Association of School Boards and State Board of Public Instruction and as director of the National Association of State Boards of Education, as well as serving on the Iowa Educational Radio and Television Facilities Board. Menke received Morningside College's Distinguished Alumni award in 1975.",
"role": "assistant"
}
]
| Lester D. Menke (December 16, 1918 – March 5, 2016) was a state Representative from the Iowa's 5th and 7th Districts. He served in the Iowa House of Representatives from 1973 to 1985, serving as Speaker pro Tempore from 1981 to 1985. After he served in the Iowa House, Menke served as a liaison between Governor Terry Branstad and the legislature for two years. Menke has a B.A. from Morningside College, where he later served as a member of the board of directors, and attended The University of Iowa College of Law for one year. He worked as a farm owner and for an insurance agency. He served on various school boards and served as president of the Iowa Association of School Boards and State Board of Public Instruction and as director of the National Association of State Boards of Education, as well as serving on the Iowa Educational Radio and Television Facilities Board. Menke received Morningside College's Distinguished Alumni award in 1975. Who was Lester Menke |
open_qa | [
{
"content": "What are the four ingredients for beer?",
"role": "user"
},
{
"content": "Water, Barley, Yeast and Hops",
"role": "assistant"
}
]
| What are the four ingredients for beer? |
open_qa | [
{
"content": "Approx. how many nurses were enrolled in World War 2?",
"role": "user"
},
{
"content": "More than 100,000 nurses were enrolled to the Red Cross during WW2",
"role": "assistant"
}
]
| Approx. how many nurses were enrolled in World War 2? |
brainstorming | [
{
"content": "Think of a bunch of ways that you could clean a house.",
"role": "user"
},
{
"content": "You can use a Vacuum or bring in a rug cleaner. You could dust extensively. You could powerwash the outside of the house. You could clean the bathrooms with bleach. You could scrub down all of the kitchen with cleaning supplies. You could paint the walls.",
"role": "assistant"
}
]
| Think of a bunch of ways that you could clean a house. |
open_qa | [
{
"content": "What is the difference between a guitar and a ukulele?",
"role": "user"
},
{
"content": "While a ukulele might be thought of as a small guitar, there are actually numerous differences between the two instruments:\n1. A ukulele has 4 strings while a guitar has 6 strings or sometimes 12\n2. A ukulele's 4 strings are tuned differently from any consecutive series of a guitar's 4 strings",
"role": "assistant"
}
]
| What is the difference between a guitar and a ukulele? |
closed_qa | [
{
"content": "A large language model (LLM) is a language model consisting of a neural network with many parameters (typically billions of weights or more), trained on large quantities of unlabelled text using self-supervised learning. LLMs emerged around 2018 and perform well at a wide variety of tasks. This has shifted the focus of natural language processing research away from the previous paradigm of training specialized supervised models for specific tasks.\n\nProperties\nThough the term large language model has no formal definition, it often refers to deep learning models having a parameter count on the order of billions or more. LLMs are general purpose models which excel at a wide range of tasks, as opposed to being trained for one specific task (such as sentiment analysis, named entity recognition, or mathematical reasoning). The skill with which they accomplish tasks, and the range of tasks at which they are capable, seems to be a function of the amount of resources (data, parameter-size, computing power) devoted to them, in a way that is not dependent on additional breakthroughs in design.\n\nThough trained on simple tasks along the lines of predicting the next word in a sentence, neural language models with sufficient training and parameter counts are found to capture much of the syntax and semantics of human language. In addition, large language models demonstrate considerable general knowledge about the world, and are able to \"memorize\" a great quantity of facts during training.\n\nHallucinations\nMain article: Hallucination (artificial intelligence)\nIn artificial intelligence in general, and in large language models in particular, a \"hallucination\" is a confident response that does not seem to be justified by the model's training data.\n\nEmergent abilities\n\nOn a number of natural language benchmarks involving tasks such as question answering, models perform no better than random chance until they reach a certain scale (in this case, measured by training computation), at which point their performance sharply increases. These are examples of emergent abilities.\nUnpredictable abilities that have been observed in large language models but that were not present in simpler models (and that were not explicitly designed into the model) are usually called \"emergent abilities\". Researchers note that such abilities \"cannot be predicted simply by extrapolating the performance of smaller models\". These abilities are discovered rather than programmed-in or designed, in some cases only after the LLM has been publicly deployed. Hundreds of emergent abilities have been described. Examples include multi-step arithmetic, taking college-level exams, identifying the intended meaning of a word, chain-of-thought prompting, decoding the International Phonetic Alphabet, unscrambling a word’s letters, identifying offensive content in paragraphs of Hinglish (a combination of Hindi and English), and generating a similar English equivalent of Kiswahili proverbs.\n\nArchitecture and training\nLarge language models have most commonly used the transformer architecture, which, since 2018, has become the standard deep learning technique for sequential data (previously, recurrent architectures such as the LSTM were most common). LLMs are trained in an unsupervised manner on unannotated text. A left-to-right transformer is trained to maximize the probability assigned to the next word in the training data, given the previous context. Alternatively, an LLM may use a bidirectional transformer (as in the example of BERT), which assigns a probability distribution over words given access to both preceding and following context. In addition to the task of predicting the next word or \"filling in the blanks\", LLMs may be trained on auxiliary tasks which test their understanding of the data distribution such as Next Sentence Prediction (NSP), in which pairs of sentences are presented and the model must predict whether they appear side-by-side in the training corpus.\n\nThe earliest LLMs were trained on corpora having on the order of billions of words. The first model in OpenAI's GPT series was trained in 2018 on BookCorpus, consisting of 985 million words. In the same year, BERT was trained on a combination of BookCorpus and English Wikipedia, totalling 3.3 billion words. In the years since then, training corpora for LLMs have increased by orders of magnitude, reaching up to hundreds of billions or trillions of tokens.\n\nLLMs are computationally expensive to train. A 2020 study estimated the cost of training a 1.5 billion parameter model (1-2 orders of magnitude smaller than the state of the art at the time) at $1.6 million.\n\nA 2020 analysis found that neural language models' capability (as measured by training loss) increased smoothly in a power law relationship with number of parameters, quantity of training data, and computation used for training. These relationships were tested over a wide range of values (up to seven orders of magnitude) and no attenuation of the relationship was observed at the highest end of the range (including for network sizes up to trillions of parameters).\n\nApplication to downstream tasks\nBetween 2018 and 2020, the standard method for harnessing an LLM for a specific natural language processing (NLP) task was to fine tune the model with additional task-specific training. It has subsequently been found that more powerful LLMs such as GPT-3 can solve tasks without additional training via \"prompting\" techniques, in which the problem to be solved is presented to the model as a text prompt, possibly with some textual examples of similar problems and their solutions.\n\nFine-tuning\nMain article: Fine-tuning (machine learning)\nFine-tuning is the practice of modifying an existing pretrained language model by training it (in a supervised fashion) on a specific task (e.g. sentiment analysis, named entity recognition, or part-of-speech tagging). It is a form of transfer learning. It generally involves the introduction of a new set of weights connecting the final layer of the language model to the output of the downstream task. The original weights of the language model may be \"frozen\", such that only the new layer of weights connecting them to the output are learned during training. Alternatively, the original weights may receive small updates (possibly with earlier layers frozen).\n\nPrompting\nSee also: Prompt engineering and Few-shot learning (natural language processing)\nIn the prompting paradigm, popularized by GPT-3, the problem to be solved is formulated via a text prompt, which the model must solve by providing a completion (via inference). In \"few-shot prompting\", the prompt includes a small number of examples of similar (problem, solution) pairs. For example, a sentiment analysis task of labelling the sentiment of a movie review could be prompted as follows:\n\nReview: This movie stinks.\nSentiment: negative\n\nReview: This movie is fantastic!\nSentiment:\n\nIf the model outputs \"positive\", then it has correctly solved the task. In zero-shot prompting, no solve examples are provided. An example of a zero-shot prompt for the same sentiment analysis task would be \"The sentiment associated with the movie review 'This movie is fantastic!' is\".\n\nFew-shot performance of LLMs has been shown to achieve competitive results on NLP tasks, sometimes surpassing prior state-of-the-art fine-tuning approaches. Examples of such NLP tasks are translation, question answering, cloze tasks, unscrambling words, and using a novel word in a sentence. The creation and optimisation of such prompts is called prompt engineering.\n\nInstruction tuning\nInstruction tuning is a form of fine-tuning designed to facilitate more natural and accurate zero-shot prompting interactions. Given a text input, a pretrained language model will generate a completion which matches the distribution of text on which it was trained. A naive language model given the prompt \"Write an essay about the main themes of Hamlet.\" might provide a completion such as \"A late penalty of 10% per day will be applied to submissions received after March 17.\" In instruction tuning, the language model is trained on many examples of tasks formulated as natural language instructions, along with appropriate responses. Various techniques for instruction tuning have been applied in practice. OpenAI's InstructGPT protocol involves supervised fine-tuning on a dataset of human-generated (prompt, response) pairs, followed by reinforcement learning from human feedback (RLHF), in which a reward function was learned based on a dataset of human preferences. Another technique, \"self-instruct\", fine-tunes the language model on a training set of examples which are themselves generated by an LLM (bootstrapped from a small initial set of human-generated examples).\n\nhttps://en.wikipedia.org/wiki/Large_language_model Given these paragraphs about Large language models, what are some examples of emergent abilities?",
"role": "user"
},
{
"content": "Examples include multi-step arithmetic, taking college-level exams, identifying the intended meaning of a word, chain-of-thought prompting, decoding the International Phonetic Alphabet, unscrambling a word’s letters, identifying offensive content in paragraphs of Hinglish (a combination of Hindi and English), and generating a similar English equivalent of Kiswahili proverbs.",
"role": "assistant"
}
]
| A large language model (LLM) is a language model consisting of a neural network with many parameters (typically billions of weights or more), trained on large quantities of unlabelled text using self-supervised learning. LLMs emerged around 2018 and perform well at a wide variety of tasks. This has shifted the focus of natural language processing research away from the previous paradigm of training specialized supervised models for specific tasks.
Properties
Though the term large language model has no formal definition, it often refers to deep learning models having a parameter count on the order of billions or more. LLMs are general purpose models which excel at a wide range of tasks, as opposed to being trained for one specific task (such as sentiment analysis, named entity recognition, or mathematical reasoning). The skill with which they accomplish tasks, and the range of tasks at which they are capable, seems to be a function of the amount of resources (data, parameter-size, computing power) devoted to them, in a way that is not dependent on additional breakthroughs in design.
Though trained on simple tasks along the lines of predicting the next word in a sentence, neural language models with sufficient training and parameter counts are found to capture much of the syntax and semantics of human language. In addition, large language models demonstrate considerable general knowledge about the world, and are able to "memorize" a great quantity of facts during training.
Hallucinations
Main article: Hallucination (artificial intelligence)
In artificial intelligence in general, and in large language models in particular, a "hallucination" is a confident response that does not seem to be justified by the model's training data.
Emergent abilities
On a number of natural language benchmarks involving tasks such as question answering, models perform no better than random chance until they reach a certain scale (in this case, measured by training computation), at which point their performance sharply increases. These are examples of emergent abilities.
Unpredictable abilities that have been observed in large language models but that were not present in simpler models (and that were not explicitly designed into the model) are usually called "emergent abilities". Researchers note that such abilities "cannot be predicted simply by extrapolating the performance of smaller models". These abilities are discovered rather than programmed-in or designed, in some cases only after the LLM has been publicly deployed. Hundreds of emergent abilities have been described. Examples include multi-step arithmetic, taking college-level exams, identifying the intended meaning of a word, chain-of-thought prompting, decoding the International Phonetic Alphabet, unscrambling a word’s letters, identifying offensive content in paragraphs of Hinglish (a combination of Hindi and English), and generating a similar English equivalent of Kiswahili proverbs.
Architecture and training
Large language models have most commonly used the transformer architecture, which, since 2018, has become the standard deep learning technique for sequential data (previously, recurrent architectures such as the LSTM were most common). LLMs are trained in an unsupervised manner on unannotated text. A left-to-right transformer is trained to maximize the probability assigned to the next word in the training data, given the previous context. Alternatively, an LLM may use a bidirectional transformer (as in the example of BERT), which assigns a probability distribution over words given access to both preceding and following context. In addition to the task of predicting the next word or "filling in the blanks", LLMs may be trained on auxiliary tasks which test their understanding of the data distribution such as Next Sentence Prediction (NSP), in which pairs of sentences are presented and the model must predict whether they appear side-by-side in the training corpus.
The earliest LLMs were trained on corpora having on the order of billions of words. The first model in OpenAI's GPT series was trained in 2018 on BookCorpus, consisting of 985 million words. In the same year, BERT was trained on a combination of BookCorpus and English Wikipedia, totalling 3.3 billion words. In the years since then, training corpora for LLMs have increased by orders of magnitude, reaching up to hundreds of billions or trillions of tokens.
LLMs are computationally expensive to train. A 2020 study estimated the cost of training a 1.5 billion parameter model (1-2 orders of magnitude smaller than the state of the art at the time) at $1.6 million.
A 2020 analysis found that neural language models' capability (as measured by training loss) increased smoothly in a power law relationship with number of parameters, quantity of training data, and computation used for training. These relationships were tested over a wide range of values (up to seven orders of magnitude) and no attenuation of the relationship was observed at the highest end of the range (including for network sizes up to trillions of parameters).
Application to downstream tasks
Between 2018 and 2020, the standard method for harnessing an LLM for a specific natural language processing (NLP) task was to fine tune the model with additional task-specific training. It has subsequently been found that more powerful LLMs such as GPT-3 can solve tasks without additional training via "prompting" techniques, in which the problem to be solved is presented to the model as a text prompt, possibly with some textual examples of similar problems and their solutions.
Fine-tuning
Main article: Fine-tuning (machine learning)
Fine-tuning is the practice of modifying an existing pretrained language model by training it (in a supervised fashion) on a specific task (e.g. sentiment analysis, named entity recognition, or part-of-speech tagging). It is a form of transfer learning. It generally involves the introduction of a new set of weights connecting the final layer of the language model to the output of the downstream task. The original weights of the language model may be "frozen", such that only the new layer of weights connecting them to the output are learned during training. Alternatively, the original weights may receive small updates (possibly with earlier layers frozen).
Prompting
See also: Prompt engineering and Few-shot learning (natural language processing)
In the prompting paradigm, popularized by GPT-3, the problem to be solved is formulated via a text prompt, which the model must solve by providing a completion (via inference). In "few-shot prompting", the prompt includes a small number of examples of similar (problem, solution) pairs. For example, a sentiment analysis task of labelling the sentiment of a movie review could be prompted as follows:
Review: This movie stinks.
Sentiment: negative
Review: This movie is fantastic!
Sentiment:
If the model outputs "positive", then it has correctly solved the task. In zero-shot prompting, no solve examples are provided. An example of a zero-shot prompt for the same sentiment analysis task would be "The sentiment associated with the movie review 'This movie is fantastic!' is".
Few-shot performance of LLMs has been shown to achieve competitive results on NLP tasks, sometimes surpassing prior state-of-the-art fine-tuning approaches. Examples of such NLP tasks are translation, question answering, cloze tasks, unscrambling words, and using a novel word in a sentence. The creation and optimisation of such prompts is called prompt engineering.
Instruction tuning
Instruction tuning is a form of fine-tuning designed to facilitate more natural and accurate zero-shot prompting interactions. Given a text input, a pretrained language model will generate a completion which matches the distribution of text on which it was trained. A naive language model given the prompt "Write an essay about the main themes of Hamlet." might provide a completion such as "A late penalty of 10% per day will be applied to submissions received after March 17." In instruction tuning, the language model is trained on many examples of tasks formulated as natural language instructions, along with appropriate responses. Various techniques for instruction tuning have been applied in practice. OpenAI's InstructGPT protocol involves supervised fine-tuning on a dataset of human-generated (prompt, response) pairs, followed by reinforcement learning from human feedback (RLHF), in which a reward function was learned based on a dataset of human preferences. Another technique, "self-instruct", fine-tunes the language model on a training set of examples which are themselves generated by an LLM (bootstrapped from a small initial set of human-generated examples).
https://en.wikipedia.org/wiki/Large_language_model Given these paragraphs about Large language models, what are some examples of emergent abilities? |
open_qa | [
{
"content": "What are some things that would cause the velocity of money within an economy to increase?",
"role": "user"
},
{
"content": "The velocity of money is a macro economics term referring to the speed with which money changes hands, which can be determined by dividing the annual aggregate economic output (also called gross domestic product) of a country by the applicable money supply. The velocity of money can be impacted by many things. Growing optimism and confidence among consumers and businesses can increase velocity, whereas a decline in velocity can occur when people and companies become gloomier or more uncertain of their financial futures. Enhancements in technology that make transactions more efficient can also increase velocity.",
"role": "assistant"
}
]
| What are some things that would cause the velocity of money within an economy to increase? |
closed_qa | [
{
"content": "Sushi (すし, 寿司, 鮨, 鮓, pronounced [sɯɕiꜜ] or [sɯꜜɕi]) is a Japanese dish of prepared vinegared rice (鮨飯, sushi-meshi), usually with some sugar and salt, accompanied by a variety of ingredients (ねた, neta), such as seafood, often raw, and vegetables. Styles of sushi and its presentation vary widely, but the one key ingredient is \"sushi rice\", also referred to as shari (しゃり), or sumeshi (酢飯).\n\nThe inventor of modern sushi is believed to be Hanaya Yohei, who invented nigiri-zushi, a type of sushi most known today, in which seafood is placed on hand-pressed vinegared rice, around 1824 in the Edo period (1603–1867). It was the fast food of the chōnin class in the Edo period.\n\nSushi is traditionally made with medium-grain white rice, though it can be prepared with brown rice or short-grain rice. It is very often prepared with seafood, such as squid, eel, yellowtail, salmon, tuna or imitation crab meat. Many types of sushi are vegetarian. It is often served with pickled ginger (gari), wasabi, and soy sauce. Daikon radish or pickled daikon (takuan) are popular garnishes for the dish.\n\nSushi is sometimes confused with sashimi, a similar dish in Japanese cuisine that consists of thinly sliced raw fish or occasionally meat. What is a Japanese dish of prepared rice, usually with some sugar and salt, accompanied by a variety of ingredients, such as seafood, often raw, and vegetables?",
"role": "user"
},
{
"content": "Sushi is the answer to the question.",
"role": "assistant"
}
]
| Sushi (すし, 寿司, 鮨, 鮓, pronounced [sɯɕiꜜ] or [sɯꜜɕi]) is a Japanese dish of prepared vinegared rice (鮨飯, sushi-meshi), usually with some sugar and salt, accompanied by a variety of ingredients (ねた, neta), such as seafood, often raw, and vegetables. Styles of sushi and its presentation vary widely, but the one key ingredient is "sushi rice", also referred to as shari (しゃり), or sumeshi (酢飯).
The inventor of modern sushi is believed to be Hanaya Yohei, who invented nigiri-zushi, a type of sushi most known today, in which seafood is placed on hand-pressed vinegared rice, around 1824 in the Edo period (1603–1867). It was the fast food of the chōnin class in the Edo period.
Sushi is traditionally made with medium-grain white rice, though it can be prepared with brown rice or short-grain rice. It is very often prepared with seafood, such as squid, eel, yellowtail, salmon, tuna or imitation crab meat. Many types of sushi are vegetarian. It is often served with pickled ginger (gari), wasabi, and soy sauce. Daikon radish or pickled daikon (takuan) are popular garnishes for the dish.
Sushi is sometimes confused with sashimi, a similar dish in Japanese cuisine that consists of thinly sliced raw fish or occasionally meat. What is a Japanese dish of prepared rice, usually with some sugar and salt, accompanied by a variety of ingredients, such as seafood, often raw, and vegetables? |
open_qa | [
{
"content": "What kind of milk is Vietnamese coffee often served with?",
"role": "user"
},
{
"content": "Vietnamese coffee is often brewed over sweetened condensed milk.",
"role": "assistant"
}
]
| What kind of milk is Vietnamese coffee often served with? |
open_qa | [
{
"content": "is a career in enterprise software a good was to go?",
"role": "user"
},
{
"content": "yes",
"role": "assistant"
}
]
| is a career in enterprise software a good was to go? |
open_qa | [
{
"content": "What is ClassRanked?",
"role": "user"
},
{
"content": "ClassRanked is an American educational technology company based in Salt Lake City, UT that offers higher education enterprise software (SaaS) solutions for course evaluation, reporting, and survey management.\n\nThe company was founded at Duke University as a data-centric platform aiding students with course registration and subsequently shifted focus to building software for colleges and universities in 2022.",
"role": "assistant"
}
]
| What is ClassRanked? |
information_extraction | [
{
"content": "Fanny Patton was a stern-wheel driven steamboat that operated on the Willamette River, in Oregon, starting in August 1865. This steamer operated from 1865 to 1880 for various owners, and was a considered a profitable vessel. The steamer was named for the daughter of businessman Edwin N Cook, Frances Mary \"Fannie\" Cooke (1837–1886). Edwin N. Cook was one of the principals of the People's Transportation Company What was the Fannie Patton steamboat",
"role": "user"
},
{
"content": "The Fannie Patton was a steamboat operated in 1865. It was named after the daughter of businessman Edwin Cook and Frances Mary \"Fannie\" Cooke. It was operated on the Willamette River in Oregon",
"role": "assistant"
}
]
| Fanny Patton was a stern-wheel driven steamboat that operated on the Willamette River, in Oregon, starting in August 1865. This steamer operated from 1865 to 1880 for various owners, and was a considered a profitable vessel. The steamer was named for the daughter of businessman Edwin N Cook, Frances Mary "Fannie" Cooke (1837–1886). Edwin N. Cook was one of the principals of the People's Transportation Company What was the Fannie Patton steamboat |
closed_qa | [
{
"content": "In 2004, Nintendo released the Nintendo DS, which featured such innovations as dual screens – one of which being a touchscreen – and wireless connectivity for multiplayer play. Throughout its lifetime, more than 154 million units were sold, making it the most successful handheld console and the second best-selling console in history. In 2005, Nintendo released the Game Boy Micro, the last system in the Game Boy line. Sales did not meet Nintendo's expectations, with 2.5 million units being sold by 2007. In mid-2005, the Nintendo World Store was inaugurated in New York City. Given this paragraph about video game consoles, when was the Nintendo DS released?",
"role": "user"
},
{
"content": "2004",
"role": "assistant"
}
]
| In 2004, Nintendo released the Nintendo DS, which featured such innovations as dual screens – one of which being a touchscreen – and wireless connectivity for multiplayer play. Throughout its lifetime, more than 154 million units were sold, making it the most successful handheld console and the second best-selling console in history. In 2005, Nintendo released the Game Boy Micro, the last system in the Game Boy line. Sales did not meet Nintendo's expectations, with 2.5 million units being sold by 2007. In mid-2005, the Nintendo World Store was inaugurated in New York City. Given this paragraph about video game consoles, when was the Nintendo DS released? |
open_qa | [
{
"content": "What is the difference between American Football and European Football?",
"role": "user"
},
{
"content": "Prior to American Football coming into existence, European Football was played throughout the world as an athletic sport that entailed kicking a round ball into an opponent's goal. European Football is typically played on a grass turf surface called a pitch. European Football was actually first called soccer before its adoption by the entire world and ended up settling on the name football. This is where the common confusion surrounds European Football and American Football. American Football, created much later than European Football, is played with a pig skin with a prolate shape on a grass turf surface, much like European Football. In American Football, instead of using their feet, players use their hands to pass the ball to one another through the air or hand the ball off to one another and attempt to run into the opponent's endzone. When European Football eventually came to the United States, the moniker soccer remained with the sport. This is why European Football is the same as American Soccer and American Football is not the same as European Football.",
"role": "assistant"
}
]
| What is the difference between American Football and European Football? |
open_qa | [
{
"content": "“Social Distancing” refers to keeping a safe distance of",
"role": "user"
},
{
"content": "About 3 to 6 feet from others",
"role": "assistant"
}
]
| “Social Distancing” refers to keeping a safe distance of |
open_qa | [
{
"content": "Whats the name of the person who wrote the US declaration of independence?",
"role": "user"
},
{
"content": "Thomas Jefferson",
"role": "assistant"
}
]
| Whats the name of the person who wrote the US declaration of independence? |
general_qa | [
{
"content": "What is the meaning of life?",
"role": "user"
},
{
"content": "The world is a vast, beautiful and complex place. The meaning of life is to find loved ones to join us on this journey; to be present in the short time we have on the earth. The meaning of life is to experience living. To lay in a dark field, watching the stars glow. To stand in the pouring rain, feeling giant drops drip down your chin. To watch a lightning storm and let the thunder rumble through your chest. To witness a child throw their head back with peels of laughter. The meaning of life is to wonder. To gaze upon the great abyss and ask the \"how\" and \"why\" of the universe. The meaning of life is to leave the earth the same, or slightly better than you were given. To stand up for injustice. To protect children. To make the day slightly easier for someone. Meaning can be found in any moment in your time here on earth; go live it!",
"role": "assistant"
}
]
| What is the meaning of life? |
classification | [
{
"content": "Is this hockey, baseball, or both?",
"role": "user"
},
{
"content": "Puck, Ball, Ice, Dirt, Skates, Cleats, Gloves, Glove, Bat, Stick, Pads, Helmet",
"role": "assistant"
}
]
| Is this hockey, baseball, or both? |
general_qa | [
{
"content": "What is the Shy Plant?",
"role": "user"
},
{
"content": "The scientific name of the shy plant also known as the shame plant is Mimosa pudica, which means shy, bashful, and sensitive. The structures of the shy plant are interesting; it has an herbaceous stem. As well as a dicot on a monocot stem. It has beautiful flowers and leaves that are green, and they are thigmotropism negative. When the shy plant's leaves are touched, they curl up. The Shy plant needs direct sunlight, and 70 to 80 degrees indoors is a good place for it. When the need to water comes, the soil must be 50% dry. The medical value of the Shy plant is great. It helps with Hemorrhoids, infections, sores, and sinuses.",
"role": "assistant"
}
]
| What is the Shy Plant? |
open_qa | [
{
"content": "What is the current best TV show?",
"role": "user"
},
{
"content": "Ted Lasso because of it's heart wrenching plot, amazingly developed characters & an overall positive message. It also provides example of relatability in the characters to your own personal life.",
"role": "assistant"
}
]
| What is the current best TV show? |
brainstorming | [
{
"content": "Give me a list of the top ten movies, according to IMDb ratings.",
"role": "user"
},
{
"content": "1. The Shawshank Redemption (1994), 9.2 points\n2. The Godfather (1972) 9.2 points\n3. The Dark Knight (2008), 9.0 points\n4. The Godfather Part II (1974), 9.0 points\n5. 12 Angry Men (1957), 9.0 points\n6. Schindler's List (1993), 8.9 points\n7. The Lord of the Rings: The Return of the King (2003), 8.9 points\n8. Pulp Fiction (1994), 8.8 points\n9. The Lord of the Rings: The Fellowship of the Ring (2001), 8.8 points\n10. The Good, the Bad and the Ugly (1966), 8.8 points",
"role": "assistant"
}
]
| Give me a list of the top ten movies, according to IMDb ratings. |
summarization | [
{
"content": "In physics, gravity (from Latin gravitas 'weight') is a fundamental interaction which causes mutual attraction between all things with mass or energy. Gravity is, by far, the weakest of the four fundamental interactions, approximately 10^38 times weaker than the strong interaction, 10^36 times weaker than the electromagnetic force and 10^29 times weaker than the weak interaction. As a result, it has no significant influence at the level of subatomic particles. However, gravity is the most significant interaction between objects at the macroscopic scale, and it determines the motion of planets, stars, galaxies, and even light. What is gravity?",
"role": "user"
},
{
"content": "Gravity can be described as the fundamental interaction which causes mutual attraction between all objects with mass or energy. While it is considered the weakest of the four fundamental forces (electromagnetic, strong interaction, and weak interaction), it is most significant force at the macroscopic scale and can influence the motion of planets, stars, galaxies, and light.",
"role": "assistant"
}
]
| In physics, gravity (from Latin gravitas 'weight') is a fundamental interaction which causes mutual attraction between all things with mass or energy. Gravity is, by far, the weakest of the four fundamental interactions, approximately 10^38 times weaker than the strong interaction, 10^36 times weaker than the electromagnetic force and 10^29 times weaker than the weak interaction. As a result, it has no significant influence at the level of subatomic particles. However, gravity is the most significant interaction between objects at the macroscopic scale, and it determines the motion of planets, stars, galaxies, and even light. What is gravity? |
summarization | [
{
"content": "The most critical and controversial provision in the treaty was: \"The Allied and Associated Governments affirm and Germany accepts the responsibility of Germany and her allies for causing all the loss and damage to which the Allied and Associated Governments and their nationals have been subjected as a consequence of the war imposed upon them by the aggression of Germany and her allies.\" The other members of the Central Powers signed treaties containing similar articles. This article, Article 231, became known as the War Guilt clause. The treaty required Germany to disarm, make ample territorial concessions, and pay reparations to certain countries that had formed the Entente powers. In 1921 the total cost of these reparations was assessed at 132 billion gold marks (then $31.4 billion or £6.6 billion, roughly equivalent to US$442 billion or UK£284 billion in 2023). Because of the way the deal was structured, the Allied Powers intended Germany would only ever pay a value of 50 billion marks. What were the key points of the Treaty of Versailles?",
"role": "user"
},
{
"content": "The Treaty of Versailles was a peace treaty to end World War I. The critical point in the treaty between the Germans and the Allied powers was that Germany accepted full responsibility for the loss and damage incurred to the Allies. Germany was required to disarm and pay reparations estimated at $31.4 billion in 1921.",
"role": "assistant"
}
]
| The most critical and controversial provision in the treaty was: "The Allied and Associated Governments affirm and Germany accepts the responsibility of Germany and her allies for causing all the loss and damage to which the Allied and Associated Governments and their nationals have been subjected as a consequence of the war imposed upon them by the aggression of Germany and her allies." The other members of the Central Powers signed treaties containing similar articles. This article, Article 231, became known as the War Guilt clause. The treaty required Germany to disarm, make ample territorial concessions, and pay reparations to certain countries that had formed the Entente powers. In 1921 the total cost of these reparations was assessed at 132 billion gold marks (then $31.4 billion or £6.6 billion, roughly equivalent to US$442 billion or UK£284 billion in 2023). Because of the way the deal was structured, the Allied Powers intended Germany would only ever pay a value of 50 billion marks. What were the key points of the Treaty of Versailles? |
general_qa | [
{
"content": "What is a Series I-Bond?",
"role": "user"
},
{
"content": "An I-Bond is a savings bond you can purchase from treasury direct that helps protect you from inflation. An I-Bond earns interest at both a fixed rate and the inflation rate, which is determined by the treasury department and is adjusted twice a year. You can purchase up to $10,000 of electronic I-Bonds per calendar year.",
"role": "assistant"
}
]
| What is a Series I-Bond? |
classification | [
{
"content": "Which characters belong to DC or Marvel Universe? Red Hood, Bucky Barnes",
"role": "user"
},
{
"content": "Red Hood is DC, Bucky Barnes is Marvel",
"role": "assistant"
}
]
| Which characters belong to DC or Marvel Universe? Red Hood, Bucky Barnes |
general_qa | [
{
"content": "Explain the Fibonacci sequence",
"role": "user"
},
{
"content": "The Fibonacci sequence is a sequence of numbers, where each number is the sum of the two numbers before that number. The Fibonacci sequence usually starts with zero followed by one. The next number in the sequence is then the sum of the preceding numbers, one and zero, which is one again. The following number is the sum of one and one: two. According to the same logic, the first ten numbers of the Fibonacci sequence are: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34.",
"role": "assistant"
}
]
| Explain the Fibonacci sequence |
closed_qa | [
{
"content": "King Field (alternately, Kingfield) is a neighborhood in the Southwest community in Minneapolis, Minnesota. Its boundaries are 36th Street to the north, Interstate 35W to the east, 46th Street to the south, and Lyndale Avenue to the west. King Field, within the King Field neighborhood is a park named after Martin Luther King Jr.\n\nThis was farm country in the 2nd half of the 19th century. Transportation was by horse and buggy. Fewer than 20 farms had been established by 1874. C.C. Garvey owned a dairy farm near 44th Street and Grand Ave. George Bichnell farmed 18 acres (73,000 m2) of land from Lyndale to Pleasant, 42nd to 43rd Streets. Hiram Van Nest farmed 28 acres (110,000 m2) of land from 40th to 42nd, Pleasant to Lyndale. The Farmsworth farm occupied 57 acres (230,000 m2) south of 47th Street and East of Nicollet. Were cars used for transportation in the 19th century in King Field?",
"role": "user"
},
{
"content": "No, transportation was by horse and buggy",
"role": "assistant"
}
]
| King Field (alternately, Kingfield) is a neighborhood in the Southwest community in Minneapolis, Minnesota. Its boundaries are 36th Street to the north, Interstate 35W to the east, 46th Street to the south, and Lyndale Avenue to the west. King Field, within the King Field neighborhood is a park named after Martin Luther King Jr.
This was farm country in the 2nd half of the 19th century. Transportation was by horse and buggy. Fewer than 20 farms had been established by 1874. C.C. Garvey owned a dairy farm near 44th Street and Grand Ave. George Bichnell farmed 18 acres (73,000 m2) of land from Lyndale to Pleasant, 42nd to 43rd Streets. Hiram Van Nest farmed 28 acres (110,000 m2) of land from 40th to 42nd, Pleasant to Lyndale. The Farmsworth farm occupied 57 acres (230,000 m2) south of 47th Street and East of Nicollet. Were cars used for transportation in the 19th century in King Field? |
classification | [
{
"content": "Which films contain Tom Cruise and which do not contain Tom Cruise: \"Trading Places\", \"Risky Business\", \"The Hunt for Red October\", \"Top Gun\", \"The Hangover\", \"Born on the 4th of July\", \"Saving Private Ryan\", and \"Reds\"",
"role": "user"
},
{
"content": "The films which contain Tom Cruise are: \"Risky Business\", \"Top Gun\", and \"Born on the 4th of July.\" The films which do not contain Tom Cruise are: \"Trading Places\", \"The Hunt for Red October\",\"The Hangover\", \"Saving Private Ryan\", and \"Reds.\"",
"role": "assistant"
}
]
| Which films contain Tom Cruise and which do not contain Tom Cruise: "Trading Places", "Risky Business", "The Hunt for Red October", "Top Gun", "The Hangover", "Born on the 4th of July", "Saving Private Ryan", and "Reds" |
brainstorming | [
{
"content": "What steps can I take to avoid getting hit by a falling window from a skyscraper while walking about in downtown during high winds?",
"role": "user"
},
{
"content": "Here are some steps you can take to avoid getting hit by falling windows detached from tall building by strong winds from cyclones or tornadoes: \n1. The space area close to a doorway or near windows is most likely to be affected by falling items, and it is best to stay away from buildings, trees and tall electric or telephone poles. Find an open space, far away from these objects and stay low to the ground to reduce your chances of being hit by debris.\n2. One of the safest places to avoid getting hit by falling objects is underground in a basement with no windows. Try to find underground spaces in downtown like the lower levels of buildings and malls, or the subway. \n3. If you absolutely need to be outside and close to tall buildings, try to stay alert and keep an eye out for falling debris. \n4. You might think that being inside a car would be a safe option, but vehicles are notoriously dangerous places to be in during high winds because of their susceptibility to being blown over or blown away or for their windows to explode.",
"role": "assistant"
}
]
| What steps can I take to avoid getting hit by a falling window from a skyscraper while walking about in downtown during high winds? |
brainstorming | [
{
"content": "Give me the top 5 burger places in Chicago",
"role": "user"
},
{
"content": "This is a bit subjective, but the best top 5 burger places in Chicago are, Au Cheval in the West Loop, Little Bad Wolf in Andersonville, The Loyalist in West Loop, Gretel, and Fatso's Last Stand in Ukrainian Village.",
"role": "assistant"
}
]
| Give me the top 5 burger places in Chicago |
creative_writing | [
{
"content": "Imagine you are the last person on Earth. Write a diary entry describing your thoughts and feelings.",
"role": "user"
},
{
"content": "Today is the 365th day that I've spent on this earth alone. While one year has passed, my days continue to remain the same. Every night, I wake up at 10:00pm, long before the scorching sunrise, to search for food, water, and any other essential items that I can cart back to my lonely den. My search concludes by 5:00am, which gives me a few hours before the first light and guaranteed death. The heat has become so destructive during the day, that I often find buildings and cars spontaneously up in flames during my nightly travels. It's becoming more and more difficult to find viable food that hasn't yet been burnt to a crisp.\n\nMy nocturnal transition is the only reason that I am alive today. I use to look up at the stars in anger that the universe could be so cruel. As time has passed, I have learned to forgive the dwarf star off to the east, as he is just as alone as I am and for far longer. Sometimes I feel ashamed that I don't have a plan other than simply surviving one more day. As the days heat up, so do the nights. It's likely only a matter of months before earth becomes uninhabitable at all hours of the day. I know my existence is becoming increasingly more finite, and even if there are others out there, their future is just as damning.",
"role": "assistant"
}
]
| Imagine you are the last person on Earth. Write a diary entry describing your thoughts and feelings. |
brainstorming | [
{
"content": "What were the top 3 best-selling PlayStation 2 video games?",
"role": "user"
},
{
"content": "Top 3 best-selling PlayStation 2 video games: Grand Theft Auto: San Andreas [17.33 million];\nGran Turismo 3: A-Spec [14.89 million]; Gran Turismo 4 [11.76 million].",
"role": "assistant"
}
]
| What were the top 3 best-selling PlayStation 2 video games? |
open_qa | [
{
"content": "What is Daylight savings time?",
"role": "user"
},
{
"content": "As the name suggests, Daylight savings time is a change in time during the spring and the fall. The reasoning behind it was that people would enjoy having more daylight hours while awake.",
"role": "assistant"
}
]
| What is Daylight savings time? |
information_extraction | [
{
"content": "Bennie John Reiges (March 4, 1920 – October 22, 2020) was an American football player and coach. He served as the head football coach at Arizona State Teachers College at Flagstaff—now known as Northern Arizona University—in 1950, compiling a record of 2–7. Reiges played college football as a quarterback at the University of California, Los Angeles (UCLA) during the 1946 and 1947 seasons. He was selected by the Los Angeles Rams in the 1947 NFL Draft. He died in October 2020 at the age of 100. Extract the names of the teams Bennie John Reiges was a part of from the text. Separate them with a comma.",
"role": "user"
},
{
"content": "University of California, Los Angeles (UCLA), Los Angeles Rams, Arizona State Teachers College at Flagstaff",
"role": "assistant"
}
]
| Bennie John Reiges (March 4, 1920 – October 22, 2020) was an American football player and coach. He served as the head football coach at Arizona State Teachers College at Flagstaff—now known as Northern Arizona University—in 1950, compiling a record of 2–7. Reiges played college football as a quarterback at the University of California, Los Angeles (UCLA) during the 1946 and 1947 seasons. He was selected by the Los Angeles Rams in the 1947 NFL Draft. He died in October 2020 at the age of 100. Extract the names of the teams Bennie John Reiges was a part of from the text. Separate them with a comma. |
general_qa | [
{
"content": "What are important elements to consider when putting together a team to execute your operating model for AI?",
"role": "user"
},
{
"content": "When building the right team to execute on your operating model for AI it is key to take into account the following elements:\n\n1) How mature is my data foundation: Whether your data is still in silos, stuck in proprietary formats or difficult to access in a unified way will have big implications on the amount of data engineering work and data platform expertise that is required.\n\n2) Infrastructure and platform administration: Whether you need to maintain or leverage as a service offerings can have a huge impact on your overall team composition. Moreover, if your Data and AI platform is made up of multiple services and components the administrative burden of governing and securing data and users and keeping all parts working together can be overwhelming especially at enterprise scale.\n\n3) MLOps: To make the most of AI you need to be able to use it to impact your business. Hiring a full data science team without having the right ML engineering expertise or the right tools to package, test, deploy and monitor is extremely wasteful. There are several steps that go into running effective end-to-end AI applications and your operating model should reflect that in the roles that are involved and in the way model lifecycle management is executed from use case identification, to development to deployment, and perhaps most importantly utilisation. \n\nThese three dimensions should inform your focus and the roles that should be part of your development team. Over time, the prevalence of certain roles might shift as your organisation matures along these dimensions and on the platform decisions that you make.",
"role": "assistant"
}
]
| What are important elements to consider when putting together a team to execute your operating model for AI? |
open_qa | [
{
"content": "What is CloudFormation?",
"role": "user"
},
{
"content": "AWS CloudFormation is an infrastructure as code (IaC) service that allows you to easily model, provision, and manage AWS and third-party resources.",
"role": "assistant"
}
]
| What is CloudFormation? |
brainstorming | [
{
"content": "Why Audi Q5 sportsback is best over its rival",
"role": "user"
},
{
"content": "Audi Q5 is a great car. It's rival Mercedes GLC and BMW X3. Compare to this Audi q5 sportsback is good looking. the Car has enough power to beat these 2 on Hill road because of it's Quattro",
"role": "assistant"
}
]
| Why Audi Q5 sportsback is best over its rival |
summarization | [
{
"content": "Stevie Wonder is an American singer-songwriter, who is credited as a pioneer and influence by musicians across a range of genres that include rhythm and blues, pop, soul, gospel, funk, and jazz. Who is Stevie Wonder?",
"role": "user"
},
{
"content": "Stevie Wonder is an American singer-songwriter, who is credited as a pioneer and influence by musicians across a range of genres that include rhythm and blues, pop, soul, gospel, funk, and jazz.\nA virtual one-man band, Wonder's use of synthesizers and other electronic musical instruments during the 1970s reshaped the conventions of R&B. He also helped drive such genres into the album era, crafting his LPs as cohesive and consistent, in addition to socially conscious statements with complex compositions. Blind since shortly after his birth, Wonder was a child prodigy who signed with Motown's Tamla label at the age of 11, where he was given the professional name Little Stevie Wonder.",
"role": "assistant"
}
]
| Stevie Wonder is an American singer-songwriter, who is credited as a pioneer and influence by musicians across a range of genres that include rhythm and blues, pop, soul, gospel, funk, and jazz. Who is Stevie Wonder? |
open_qa | [
{
"content": "How many states are part of New England?",
"role": "user"
},
{
"content": "New England is composed of six states.",
"role": "assistant"
}
]
| How many states are part of New England? |
open_qa | [
{
"content": "What is the shape of the Earth?",
"role": "user"
},
{
"content": "The general shape of the planet is a sphere",
"role": "assistant"
}
]
| What is the shape of the Earth? |
open_qa | [
{
"content": "What is 12-3-30?",
"role": "user"
},
{
"content": "12-3-3- is the viral workout trend that's been popularized on social media. It entails walking on a treadmill at an incline of 12, a speed of 3 mph, for 30 minutes.",
"role": "assistant"
}
]
| What is 12-3-30? |
open_qa | [
{
"content": "What was the first British instrumental to top the USA charts",
"role": "user"
},
{
"content": "Telstar by The Tornados",
"role": "assistant"
}
]
| What was the first British instrumental to top the USA charts |
closed_qa | [
{
"content": "The 1977 Tournament Players Championship was a golf tournament in Florida on the PGA Tour, held March 17–20 at Sawgrass Country Club in Ponte Vedra Beach, southeast of Jacksonville. The fourth Tournament Players Championship, it was the first of five consecutive at Sawgrass, which had agreed a multi-year with the PGA Tour in 1976.\n\nMark Hayes was the champion in windy conditions at 289 (+1), two strokes ahead of runner-up Mike McCullough. McCullough and Tom Watson were the co-leaders after the third round, with Hayes a stroke back. Defending champion Jack Nicklaus finished four strokes back, in a tie for fifth place.\n\nBob Menne set the tour's 72-hole record for fewest putts with 99, but tied for 47th at 303 (+15). The record had been 102 putts, by Bert Yancey in 1966 at his victory in the final Portland Open Invitational. Given this information about the players championship tournament, what were the weather conditions on March 20th 1977?",
"role": "user"
},
{
"content": "It was windy",
"role": "assistant"
}
]
| The 1977 Tournament Players Championship was a golf tournament in Florida on the PGA Tour, held March 17–20 at Sawgrass Country Club in Ponte Vedra Beach, southeast of Jacksonville. The fourth Tournament Players Championship, it was the first of five consecutive at Sawgrass, which had agreed a multi-year with the PGA Tour in 1976.
Mark Hayes was the champion in windy conditions at 289 (+1), two strokes ahead of runner-up Mike McCullough. McCullough and Tom Watson were the co-leaders after the third round, with Hayes a stroke back. Defending champion Jack Nicklaus finished four strokes back, in a tie for fifth place.
Bob Menne set the tour's 72-hole record for fewest putts with 99, but tied for 47th at 303 (+15). The record had been 102 putts, by Bert Yancey in 1966 at his victory in the final Portland Open Invitational. Given this information about the players championship tournament, what were the weather conditions on March 20th 1977? |
general_qa | [
{
"content": "How to remove limescale from showers and taps?",
"role": "user"
},
{
"content": "One natural way to get rid of limescale from showers and taps is to use white vinegar. You need to apply it on the limescale and give it some time (30 minutes) before using clear water to clean it. The higher the product has concentration of vinegar, the better it is.",
"role": "assistant"
}
]
| How to remove limescale from showers and taps? |
classification | [
{
"content": "Can you help me to categorize these things as either \"expensive\", \"not expensive\", or \"I don't know\": air, gold, rock, rocket and dream.",
"role": "user"
},
{
"content": "Air and rock are not expensive, but gold and rocket are expensive. I don't know if dream is expensive or not.",
"role": "assistant"
}
]
| Can you help me to categorize these things as either "expensive", "not expensive", or "I don't know": air, gold, rock, rocket and dream. |
open_qa | [
{
"content": "What is the difference between benefits and compensation?",
"role": "user"
},
{
"content": "Benefits are typically the medical benefits and coverage you have. For example, when you go to the doctor, insurance covers some of the cost. This is a benefit offered to you by your employer. However, benefits can also include things like a wellness reimbursement. Some companies offer benefits for employees to submit reimbursement for things like running shoes, a massage or the use of a mental health counselor. Compensation is the money you are paid for doing your job. This includes your base salary and any additional compensation you may receive such as commissions or a bonus.",
"role": "assistant"
}
]
| What is the difference between benefits and compensation? |
open_qa | [
{
"content": "What is the name of the professional football team in Colorado?",
"role": "user"
},
{
"content": "The Denver Broncos",
"role": "assistant"
}
]
| What is the name of the professional football team in Colorado? |
creative_writing | [
{
"content": "What are some must-see places in Romania?",
"role": "user"
},
{
"content": "There are a lot of beautiful places to see in Romania, so it is really hard to gather them all. On a must-see list you should include cities like Brasov, Sibiu, Sighisoara. If you like driving, you should check some beautiful roads like Transfagarasan or Transalpina. If you like hiking, you must consider Fagaras mountains.",
"role": "assistant"
}
]
| What are some must-see places in Romania? |
general_qa | [
{
"content": "What is the sun made of?",
"role": "user"
},
{
"content": "The Sun is comprised primarily of hydrogen and helium. It's held together by its own gravity. The Sun has several regions. The interior regions include the core, the radiative zone, and the convection zone.",
"role": "assistant"
}
]
| What is the sun made of? |
open_qa | [
{
"content": "How many moons does Mars have?",
"role": "user"
},
{
"content": "Mars has two moons, they were named Phobos and Deimos by the American astronomer Asaph Hall, who discovered them in August 1877.",
"role": "assistant"
}
]
| How many moons does Mars have? |
classification | [
{
"content": "Tell me whether each South Park character is a kid or adult: Randy, Stan, Kyle, Butters, Sharon",
"role": "user"
},
{
"content": "Randy: Adult\nStan: Kid\nKyle: Kid\nButters: Kid\nSharon: Adult",
"role": "assistant"
}
]
| Tell me whether each South Park character is a kid or adult: Randy, Stan, Kyle, Butters, Sharon |
information_extraction | [
{
"content": "Bloomberg L.P. is a privately held financial, software, data, and media company headquartered in Midtown Manhattan, New York City. It was co-founded by Michael Bloomberg in 1981, with Thomas Secunda, Duncan MacMillan, Charles Zegar, and a 12% ownership investment by Bank of America through their brokerage subsidiary Merrill Lynch. From the passage provided, extract when Bloomberg L.P. was founded",
"role": "user"
},
{
"content": "Bloomberg L.P. was founded in 1981",
"role": "assistant"
}
]
| Bloomberg L.P. is a privately held financial, software, data, and media company headquartered in Midtown Manhattan, New York City. It was co-founded by Michael Bloomberg in 1981, with Thomas Secunda, Duncan MacMillan, Charles Zegar, and a 12% ownership investment by Bank of America through their brokerage subsidiary Merrill Lynch. From the passage provided, extract when Bloomberg L.P. was founded |
general_qa | [
{
"content": "What are the risks of social isolation?",
"role": "user"
},
{
"content": "Social isolation can lead to feeling of loneliness that can cause depression and other mental health issues. It could also lead to social anxiety, when the individual does go out and interact with people. \nI read a research that show that the magnitude of risk presented by social isolation is very similar in magnitude to that of obesity, smoking, lack of access to care and physical activity.\nMy suggestion to those who are socially isolated will be to try to get yourself out of your comfort zone. Go to meetup.com to find people who like to do similar activities like you and join them. Once you are with them, reach out and introduce yourself. If all else fails, speak to a therapist who can provide activities to help you out.\nMental health is super important so take care of yourself and your loved one.",
"role": "assistant"
}
]
| What are the risks of social isolation? |
information_extraction | [
{
"content": "The ISS programme evolved from the Space Station Freedom, a 1984 American proposal to construct a permanently crewed Earth-orbiting station, and the contemporaneous Soviet/Russian Mir-2 proposal from 1976 with similar aims. The ISS is the ninth space station to be inhabited by crews, following the Soviet and later Russian Salyut, Almaz, and Mir stations and the American Skylab. It is the largest artificial object in the solar system and the largest satellite in low Earth orbit, regularly visible to the naked eye from Earth's surface. It maintains an orbit with an average altitude of 400 kilometres (250 mi) by means of reboost manoeuvres using the engines of the Zvezda Service Module or visiting spacecraft. The ISS circles the Earth in roughly 93 minutes, completing 15.5 orbits per day. From the passage provided, extract the average altitude in miles that the ISS orbits at.",
"role": "user"
},
{
"content": "The ISS orbits the Earth at an average altitude of 250 miles.",
"role": "assistant"
}
]
| The ISS programme evolved from the Space Station Freedom, a 1984 American proposal to construct a permanently crewed Earth-orbiting station, and the contemporaneous Soviet/Russian Mir-2 proposal from 1976 with similar aims. The ISS is the ninth space station to be inhabited by crews, following the Soviet and later Russian Salyut, Almaz, and Mir stations and the American Skylab. It is the largest artificial object in the solar system and the largest satellite in low Earth orbit, regularly visible to the naked eye from Earth's surface. It maintains an orbit with an average altitude of 400 kilometres (250 mi) by means of reboost manoeuvres using the engines of the Zvezda Service Module or visiting spacecraft. The ISS circles the Earth in roughly 93 minutes, completing 15.5 orbits per day. From the passage provided, extract the average altitude in miles that the ISS orbits at. |
closed_qa | [
{
"content": "Natural hydrogen (known as white hydrogen), is naturally occurring molecular hydrogen on or in Earth (as opposed to hydrogen produced in the laboratory or in industry). The name white hydrogen distinguishes it from green hydrogen, which is produced from renewable energy sources, and from grey, brown or black hydrogen, which is obtained from fossil sources or from the electrolysis of water. Natural hydrogen may be renewable, non-polluting and allows for lower cost operation compared to industrial hydrogen. Natural hydrogen has been identified in many source rocks in areas beyond the sedimentary basins where oil companies typically operate.\n\nOrigin of natural hydrogen\nThere are several sources of natural hydrogen:\n\n- degassing of deep hydrogen from the Earth's crust and mantle;\n- reaction of water with ultrabasic rocks (serpentinisation);\n- contact of water with reducing agents in the Earth's mantle;\n- interaction of water with freshly exposed rock surfaces (weathering);\n- decomposition of hydroxyl ions in the structure of minerals;\n- Natural radiolysis of water;\n- decomposition of organic matter;\n- biological activity\n- Extraction\n- Natural hydrogen is extracted from wells, mixed with other gases such as nitrogen or helium.\n\nSeveral sources have been identified in France. Geologists Alain Prinzhofer and Eric Derville have demonstrated the existence of large reservoirs in a dozen countries, including Mali and the United States. However, their potential remains difficult to assess.\n\nNumerous emanations on the ocean floor have been identified but are difficult to exploit. The discovery of a significant emergence in Russia in 2008 suggests the possibility of extracting native hydrogen in geological environments.\n\nGeology\nNatural hydrogen is generated continuously from a variety of natural sources. There are many known hydrogen emergences on mid-ocean ridges. Another of the known reactions, serpentinisation, occurs under the sea floor (in the oceanic crust).\n\nDiagenetic origin (iron oxidation) in the sedimentary basins of cratons, notably in Russia. Other sources are being explored, such as mantle hydrogen, or hydrogen from radiolysis (natural electrolysis) or from bacterial activity. In France, the Alps and Pyrenees are suitable for exploitation. New Caledonia has hyperalkaline sources that show dihydrogen emissions. A large accumulation of natural hydrogen was discovered in Bourakebougou (Mali).\n\nCharacteristics\nDihydrogen is very soluble in fresh water, especially at depth (solubility increases with pressure).\n\nhttps://en.wikipedia.org/wiki/Natural_hydrogen Given these paragraphs about Natural hydrogen, what is it?",
"role": "user"
},
{
"content": "Natural hydrogen (known as white hydrogen), is naturally occurring molecular hydrogen on or in Earth (as opposed to hydrogen produced in the laboratory or in industry).",
"role": "assistant"
}
]
| Natural hydrogen (known as white hydrogen), is naturally occurring molecular hydrogen on or in Earth (as opposed to hydrogen produced in the laboratory or in industry). The name white hydrogen distinguishes it from green hydrogen, which is produced from renewable energy sources, and from grey, brown or black hydrogen, which is obtained from fossil sources or from the electrolysis of water. Natural hydrogen may be renewable, non-polluting and allows for lower cost operation compared to industrial hydrogen. Natural hydrogen has been identified in many source rocks in areas beyond the sedimentary basins where oil companies typically operate.
Origin of natural hydrogen
There are several sources of natural hydrogen:
- degassing of deep hydrogen from the Earth's crust and mantle;
- reaction of water with ultrabasic rocks (serpentinisation);
- contact of water with reducing agents in the Earth's mantle;
- interaction of water with freshly exposed rock surfaces (weathering);
- decomposition of hydroxyl ions in the structure of minerals;
- Natural radiolysis of water;
- decomposition of organic matter;
- biological activity
- Extraction
- Natural hydrogen is extracted from wells, mixed with other gases such as nitrogen or helium.
Several sources have been identified in France. Geologists Alain Prinzhofer and Eric Derville have demonstrated the existence of large reservoirs in a dozen countries, including Mali and the United States. However, their potential remains difficult to assess.
Numerous emanations on the ocean floor have been identified but are difficult to exploit. The discovery of a significant emergence in Russia in 2008 suggests the possibility of extracting native hydrogen in geological environments.
Geology
Natural hydrogen is generated continuously from a variety of natural sources. There are many known hydrogen emergences on mid-ocean ridges. Another of the known reactions, serpentinisation, occurs under the sea floor (in the oceanic crust).
Diagenetic origin (iron oxidation) in the sedimentary basins of cratons, notably in Russia. Other sources are being explored, such as mantle hydrogen, or hydrogen from radiolysis (natural electrolysis) or from bacterial activity. In France, the Alps and Pyrenees are suitable for exploitation. New Caledonia has hyperalkaline sources that show dihydrogen emissions. A large accumulation of natural hydrogen was discovered in Bourakebougou (Mali).
Characteristics
Dihydrogen is very soluble in fresh water, especially at depth (solubility increases with pressure).
https://en.wikipedia.org/wiki/Natural_hydrogen Given these paragraphs about Natural hydrogen, what is it? |
brainstorming | [
{
"content": "Give me some places to visit with a 8 year old kid",
"role": "user"
},
{
"content": "Here are some places you can take a 8 year old kid\nZoos\nParks\nBeaches\nAquarium\nMuseums\nShort hiking trails\nAmusement parks\nTrampoline parks\nRestaurants with indoor play area\nArcade\nLazer tag\nLibrary\nBowling\nPaint ball",
"role": "assistant"
}
]
| Give me some places to visit with a 8 year old kid |
brainstorming | [
{
"content": "how can you generate passive income?",
"role": "user"
},
{
"content": "Compared with active income which you earn in exchange of your time and efforts, passive income comes passively as you can sit aside after proper initial setups. Some argue that time-average investing in index funds is considered passive investing. Time-average-investing or dollar cost averaging investing means you invest a fixed amount in the index fund recurringly with a given frequency, usually monthly or biweekly, regardless of the fund price. You can set it up with auto-payment or auto-investment through your brokerage and let it build your wealth over time. Index funds mirror the performance of a collection of selected stocks, thus providing a diversified strategy by its nature. SP500 index has a proven performance record that beats most active fund managers. In addition, real estate investment is somehow passive if you leave all the property management to professionals. However, the fact that it requires a certain amount of equity to get started makes younger investors shy away from it. For the younger generation, generating passive income from content they publish on social media has become a popular choice. For example, publishing videos to your YouTube channel requires time and effort to create the content. But once the video is live, it starts to generate income streams with more and more people watching your videos for years to come.",
"role": "assistant"
}
]
| how can you generate passive income? |
closed_qa | [
{
"content": "Fortress is a shooter video game developed by CCR Inc and published by Netsgo. The game spawned an animated series, Tank Knights Fortress, and a sequel, Fortress 2. On November 18, 2011, service for the game was terminated in South Korea and Japan. What game was the animated series Tank Knights Fortress based on?",
"role": "user"
},
{
"content": "Fortress.",
"role": "assistant"
}
]
| Fortress is a shooter video game developed by CCR Inc and published by Netsgo. The game spawned an animated series, Tank Knights Fortress, and a sequel, Fortress 2. On November 18, 2011, service for the game was terminated in South Korea and Japan. What game was the animated series Tank Knights Fortress based on? |
open_qa | [
{
"content": "What public health inventions did Louis Pasteur contribute to society?",
"role": "user"
},
{
"content": "Louis Pasteur is famous for the discovery of the pasteurization process and vaccination methods",
"role": "assistant"
}
]
| What public health inventions did Louis Pasteur contribute to society? |
information_extraction | [
{
"content": "Command & Conquer: Red Alert takes place in a parallel universe. At the Trinity Site in New Mexico in 1946, Albert Einstein prepares to travel back in time. He activates his experimental time machine to find himself in Landsberg, Germany, on December 20, 1924, where he meets a young Adolf Hitler just after the latter's release from Landsberg Prison. Following a brief conversation between the two, Einstein shakes Hitler's hand, which erases him from the timeline.\n\nHitler's death prevents him from rising to power as leader of Nazi Germany, effectively creating a new timeline. Without Nazi Germany, the Soviet Union (USSR) grows powerful under the rule of Joseph Stalin. The USSR seizes land from China and then invades Eastern Europe, to achieve Joseph Stalin's vision of a Soviet Union stretching across the entire Eurasian landmass. In response, the countries of Western Europe (including an already-rearmed Germany) form the Allied Nations and start a guerrilla war against the invading Soviet Army. Over the course of the game's story, the Allies and Soviets fight for control over the European mainland in an alternate World War II Extract what factions fight in the video game Command & Conquer: Red Alert",
"role": "user"
},
{
"content": "The Allies and the Soviets fight for control over Europe in the game Command & Conquer: Red Alert",
"role": "assistant"
}
]
| Command & Conquer: Red Alert takes place in a parallel universe. At the Trinity Site in New Mexico in 1946, Albert Einstein prepares to travel back in time. He activates his experimental time machine to find himself in Landsberg, Germany, on December 20, 1924, where he meets a young Adolf Hitler just after the latter's release from Landsberg Prison. Following a brief conversation between the two, Einstein shakes Hitler's hand, which erases him from the timeline.
Hitler's death prevents him from rising to power as leader of Nazi Germany, effectively creating a new timeline. Without Nazi Germany, the Soviet Union (USSR) grows powerful under the rule of Joseph Stalin. The USSR seizes land from China and then invades Eastern Europe, to achieve Joseph Stalin's vision of a Soviet Union stretching across the entire Eurasian landmass. In response, the countries of Western Europe (including an already-rearmed Germany) form the Allied Nations and start a guerrilla war against the invading Soviet Army. Over the course of the game's story, the Allies and Soviets fight for control over the European mainland in an alternate World War II Extract what factions fight in the video game Command & Conquer: Red Alert |
open_qa | [
{
"content": "Why do sailboats have to tack upwind?",
"role": "user"
},
{
"content": "Modern sailboats use sails that act as foils, with pressure that increases on the inside of the foil higher than the outside of the foil, similar to an airplane wing and described by the Bernoulli effect. The sails must have an angle of attack that is perpendicular to the direction of the wind to be effective. Off the wind, or heading away from the wind, the sails can be eased out to maintain this angle. Heading into the wind, the boat can only get so close to the direction to keep the sails from becoming ineffective or \"luffing.\" So to head in the general direction of the wind, a boat must tack at angles to the wind, to make its way in the direction of the wind.",
"role": "assistant"
}
]
| Why do sailboats have to tack upwind? |
classification | [
{
"content": "Categorize each of the following as a golf term or soccer term: slice, nutmeg, goal, stroke, putt, drive, tackle, striker.",
"role": "user"
},
{
"content": "Golf: slice, stroke, putt, drive\nSoccer: nutmeg, goal, tackle, striker",
"role": "assistant"
}
]
| Categorize each of the following as a golf term or soccer term: slice, nutmeg, goal, stroke, putt, drive, tackle, striker. |
open_qa | [
{
"content": "What does nationwide do?",
"role": "user"
},
{
"content": "Nationwide is a group of insurance companies in the United States, and other financial services. Their main head quarters is out of Arizona and they offer many services. Some of the services they offer are car insurance, home owners insurance, motorcycle insurance, pet and farm insurance, and life and commercial insurance. Insurance is a great thing to have in case you have an accident.",
"role": "assistant"
}
]
| What does nationwide do? |
general_qa | [
{
"content": "Why do people like working from home?",
"role": "user"
},
{
"content": "Employees like working from home primarily due to the flexibility it offers. Through remote work, employees can still produce deliverables but do not need to spend time commuting, getting ready in the morning, or rushing to beat traffic. It also allows working parents to better manage childcare responsibilities. On the other hand, it is important to note that some of the drawbacks of remote work include isolation and reduced productivity. It is important for each manager to determine which type of work is best suited for their team to balance employee productivity & flexibility preferences.",
"role": "assistant"
}
]
| Why do people like working from home? |
closed_qa | [
{
"content": "Karachchi Divisional Council is the local authority for Kandavalai and Karachchi DS Divisions in northern Sri Lanka. KDC is responsible for providing a variety of local public services including roads, sanitation, drains, housing, libraries, public parks and recreational facilities. It has 19 members elected using the open list proportional representation system. In which country is the Karachchi Divisional Council located?",
"role": "user"
},
{
"content": "Sri Lanka",
"role": "assistant"
}
]
| Karachchi Divisional Council is the local authority for Kandavalai and Karachchi DS Divisions in northern Sri Lanka. KDC is responsible for providing a variety of local public services including roads, sanitation, drains, housing, libraries, public parks and recreational facilities. It has 19 members elected using the open list proportional representation system. In which country is the Karachchi Divisional Council located? |
open_qa | [
{
"content": "When did Uber IPO?",
"role": "user"
},
{
"content": "Uber went public on May 9, 2019",
"role": "assistant"
}
]
| When did Uber IPO? |
general_qa | [
{
"content": "What is a Downcountry Mountain Bike?",
"role": "user"
},
{
"content": "Downcountry mountain bikes first came onto the scene around 2020 as an intersection between hard tail XC bikes and longer travel downhill/enduro bikes. They are usually full suspension with front and rear shocks. However, shorter travel than an enduro bike but much more efficient at climbing. They appeal to the rider who likes to get out and explore on their bike whilst also enjoying trail riding. Expect to see suspension travel in the range 120-130mm.",
"role": "assistant"
}
]
| What is a Downcountry Mountain Bike? |
information_extraction | [
{
"content": "As of 2022, the Eastern Conference/Division led the Western Conference/Division 40–36 in championships won. As of 2022, the Boston Celtics and the Minneapolis/Los Angeles Lakers have won a combined total of 34 NBA championships (with 17 apiece). As of 2022, the defending champions are the Golden State Warriors. Which NBA team has won the most championships?",
"role": "user"
},
{
"content": "As of 2022, the Boston Celtics and the Minneapolis/Los Angeles Lakers have won a combined total of 34 NBA championships (with 17 apiece).",
"role": "assistant"
}
]
| As of 2022, the Eastern Conference/Division led the Western Conference/Division 40–36 in championships won. As of 2022, the Boston Celtics and the Minneapolis/Los Angeles Lakers have won a combined total of 34 NBA championships (with 17 apiece). As of 2022, the defending champions are the Golden State Warriors. Which NBA team has won the most championships? |
open_qa | [
{
"content": "What is a NBA super team?",
"role": "user"
},
{
"content": "NBA superteam is a term coined in the past decade that involves various all stars deciding to team up to play for a particular organization. The super team only works if the organization has enough money to pay everyone - so often super stars will take a pay cut to play with fellow super stars. Some recent super teams, regardless of success, include Nets (Harden, Durant, Kyrie, even Simmons), Warriors (Durant, Curry, Green, Thompson), Heat (Bosh, Wade, Lebron).",
"role": "assistant"
}
]
| What is a NBA super team? |
information_extraction | [
{
"content": "La buenaventura (1934)\nGrand Canary (1934)\nTripping Through the Tropics (1934)\nTres Amores (1934)\nEl cantante de Napoles (1935)\nJulieta Buys a Son (1935)\nRosa de Francia (1935)\nEl crimen de media noche (1936)\nEl capitan Tormenta (1936)\nSong of the Gringo (1936)\nFiesta (1941)\nThe Face of Marble (1946)\nGilda (1946)\nTwo Years Before the Mast (1946)\nSecret Beyond the Door... (1947)\nSecret of the Incas (1954)\nThe Rose Tattoo (1955)\nThe Bottom of the Bottle (1956)\nLawman (1959 episode \"The Outsider\") as Mrs. Lebeau Which of the following films came out after 1948?",
"role": "user"
},
{
"content": "Secret of the Incas\nThe Rose Tattoo\nThe Bottom of the Bottle\nLawman",
"role": "assistant"
}
]
| La buenaventura (1934)
Grand Canary (1934)
Tripping Through the Tropics (1934)
Tres Amores (1934)
El cantante de Napoles (1935)
Julieta Buys a Son (1935)
Rosa de Francia (1935)
El crimen de media noche (1936)
El capitan Tormenta (1936)
Song of the Gringo (1936)
Fiesta (1941)
The Face of Marble (1946)
Gilda (1946)
Two Years Before the Mast (1946)
Secret Beyond the Door... (1947)
Secret of the Incas (1954)
The Rose Tattoo (1955)
The Bottom of the Bottle (1956)
Lawman (1959 episode "The Outsider") as Mrs. Lebeau Which of the following films came out after 1948? |
general_qa | [
{
"content": "Why is it important to lift weights?",
"role": "user"
},
{
"content": "Lifting weights is important for many reasons. Lifting weights can impact a body's physical appearance and strength, has anti-aging benefits, helps prevent osteoporosis, improves joint health, and improves cardiovascular health. Additionally, there are many popular competitions centered around strength and conditioning which has indirectly promoted various strength sports throughout the world.",
"role": "assistant"
}
]
| Why is it important to lift weights? |
brainstorming | [
{
"content": "What are the ways you can eat an apple.",
"role": "user"
},
{
"content": "You can eat the apple raw. \nOr you can add it in custard. \nYou can also have caramelised apple.\nI am sure you must have heard of apple pie.\nYou can try apple cake, sure apple sauce too, not sure how it would taste though, never really tried it. \nHow about apple juice, or apple chips. \nI think there's a whole lot way to eat apple than the regular way, but I bet eating raw is the healthiest of all.",
"role": "assistant"
}
]
| What are the ways you can eat an apple. |
open_qa | [
{
"content": "What is a tornado?",
"role": "user"
},
{
"content": "A tornado is a major storm that consists of rotating columns of air that touch the base of a thunderstorm and surface of the earth. They have speeds ranging from 86 - 200 miles per hour and destroy everything in their path. They can last for seconds or minutes at a time. States that have the most tornados are Texas, Kansas, Oklahoma, Alabama, and Mississippi. People that are in the path of a large tornado often say it sounds like an approaching freight train.",
"role": "assistant"
}
]
| What is a tornado? |
closed_qa | [
{
"content": "Marquez Phillips Pope (born October 29, 1970 in Nashville, Tennessee) is a former professional American football player who was drafted by the San Diego Chargers in the 2nd round (33rd overall) of the 1992 NFL Draft. A 5'11\" cornerback-safety from Fresno State University, Pope played for 5 teams in 10 NFL seasons from 1992 to 2001. His best year as a pro came during the 1996 season for the San Francisco 49ers, intercepting 6 passes with 1 touchdown. During his pro career, Pope was known to be among the hardest hitters in the NFL. Which team drafted Marques Pope?",
"role": "user"
},
{
"content": "The team that drafted Marquez Pope was the San Diego Chargers in the 1992 NFL Draft.",
"role": "assistant"
}
]
| Marquez Phillips Pope (born October 29, 1970 in Nashville, Tennessee) is a former professional American football player who was drafted by the San Diego Chargers in the 2nd round (33rd overall) of the 1992 NFL Draft. A 5'11" cornerback-safety from Fresno State University, Pope played for 5 teams in 10 NFL seasons from 1992 to 2001. His best year as a pro came during the 1996 season for the San Francisco 49ers, intercepting 6 passes with 1 touchdown. During his pro career, Pope was known to be among the hardest hitters in the NFL. Which team drafted Marques Pope? |
brainstorming | [
{
"content": "Give me a bulleted list of things to consider when deciding where to apply to college.",
"role": "user"
},
{
"content": "The following should be considered when deciding where to apply to college:\n1. Academic programs the college offers\n2. Cost of attendance\n3. Location of the campus\n4. Admission requirements and expectations\n5. Size of the student population\n6. Extracurricular activities the college offers",
"role": "assistant"
}
]
| Give me a bulleted list of things to consider when deciding where to apply to college. |
open_qa | [
{
"content": "What is Palmitic acid?",
"role": "user"
},
{
"content": "Palmitic acid (hexadecanoic acid in IUPAC nomenclature) is a fatty acid with a 16-carbon chain. It is the most common saturated fatty acid found in animals, plants and microorganisms. Its chemical formula is CH3(CH2)14COOH, and its C:D (the total number of carbon atoms to the number of carbon–carbon double bonds) is 16:0. It is a major component of the oil from the fruit of oil palms (palm oil), making up to 44% of total fats. Meats, cheeses, butter, and other dairy products also contain palmitic acid, amounting to 50–60% of total fats. Palmitates are the salts and esters of palmitic acid. The palmitate anion is the observed form of palmitic acid at physiologic pH (7.4).",
"role": "assistant"
}
]
| What is Palmitic acid? |
classification | [
{
"content": "Identify which instrument is string or percussion: Paila criolla, Topshur",
"role": "user"
},
{
"content": "Topshur is string, Paila criolla is percussion.",
"role": "assistant"
}
]
| Identify which instrument is string or percussion: Paila criolla, Topshur |
classification | [
{
"content": "Classify each of these car manufacturers as either French, German, American, Japanese, or other: Mercedes-Benz, Toyota, DS, Ford, Tesla, Fiat, KIA",
"role": "user"
},
{
"content": "French: DS\nGerman: Mercedes-Benz\nAmerican: Ford, Tesla\nJapanese: Toyota\nother: Fiat, KIA",
"role": "assistant"
}
]
| Classify each of these car manufacturers as either French, German, American, Japanese, or other: Mercedes-Benz, Toyota, DS, Ford, Tesla, Fiat, KIA |
classification | [
{
"content": "Which characters belong to DC or Marvel Universe? Susan Storm, Green Lantern",
"role": "user"
},
{
"content": "Susan Storm is Marvel, Green Lantern is DC",
"role": "assistant"
}
]
| Which characters belong to DC or Marvel Universe? Susan Storm, Green Lantern |
closed_qa | [
{
"content": "The Amazon rainforest, also called Amazon jungle or Amazonia, is a moist broadleaf tropical rainforest in the Amazon biome that covers most of the Amazon basin of South America. This basin encompasses 7,000,000 square km (2,700,000 square miles), of which 5,500,000 square km (2,100,000 square miles) are covered by the rainforest. This region includes territory belonging to nine nations and 3,344 formally acknowledged indigenous territories.\n\nThe majority of the forest, 60%, is in Brazil, followed by Peru with 13%, Colombia with 10%, and with minor amounts in Bolivia, Ecuador, French Guiana, Guyana, Suriname, and Venezuela. Four nations have \"Amazonas\" as the name of one of their first-level administrative regions, and France uses the name \"Guiana Amazonian Park\" for French Guiana's protected rainforest area. The Amazon represents over half of the planet's remaining rainforests, and comprises the largest and most biodiverse tract of tropical rainforest in the world, with an estimated 390 billion individual trees in about 16,000 species.\n\nMore than 30 million people of 350 different ethnic groups live in the Amazon, which are subdivided into 9 different national political systems and 3,344 formally acknowledged indigenous territories. Indigenous peoples make up 9% of the total population, and 60 of the groups remain largely isolated. Given the reference text about the Amazon Rainforest, where is it located, including all countries it spreads across, how large is it, and how many people reside within it?",
"role": "user"
},
{
"content": "Located in South America, the Amazon rainforest spreads across Brazil, Peru. Columbia, Bolivia, Ecuador, French Guiana, Guyana, Suriname, and Venezuela. The rainforest covers 5,500,000 square km (2,100,000 square miles) where more than 30 million people reside.",
"role": "assistant"
}
]
| The Amazon rainforest, also called Amazon jungle or Amazonia, is a moist broadleaf tropical rainforest in the Amazon biome that covers most of the Amazon basin of South America. This basin encompasses 7,000,000 square km (2,700,000 square miles), of which 5,500,000 square km (2,100,000 square miles) are covered by the rainforest. This region includes territory belonging to nine nations and 3,344 formally acknowledged indigenous territories.
The majority of the forest, 60%, is in Brazil, followed by Peru with 13%, Colombia with 10%, and with minor amounts in Bolivia, Ecuador, French Guiana, Guyana, Suriname, and Venezuela. Four nations have "Amazonas" as the name of one of their first-level administrative regions, and France uses the name "Guiana Amazonian Park" for French Guiana's protected rainforest area. The Amazon represents over half of the planet's remaining rainforests, and comprises the largest and most biodiverse tract of tropical rainforest in the world, with an estimated 390 billion individual trees in about 16,000 species.
More than 30 million people of 350 different ethnic groups live in the Amazon, which are subdivided into 9 different national political systems and 3,344 formally acknowledged indigenous territories. Indigenous peoples make up 9% of the total population, and 60 of the groups remain largely isolated. Given the reference text about the Amazon Rainforest, where is it located, including all countries it spreads across, how large is it, and how many people reside within it? |
classification | [
{
"content": "classify the following as good stuff vs bad stuff:\ninflation\nwars\ncollaboration\nrenewable energy\nsoil erosion\npeace\nharmony\nviolence\nbloodshed",
"role": "user"
},
{
"content": "Good stuff: \ncollaboration\nrenewable energy\npeace\nharmony\n\nBad stuff:\ninflation\nwars\nsoil erosion\nviolence\nbloodshed",
"role": "assistant"
}
]
| classify the following as good stuff vs bad stuff:
inflation
wars
collaboration
renewable energy
soil erosion
peace
harmony
violence
bloodshed |
classification | [
{
"content": "Classify each of the following as a flower or a tree: rose, tulip, oak, spruce, pine, orchid",
"role": "user"
},
{
"content": "Rose: Flower\nTulip: Flower\nOak: Tree\nSpruce: Tree\nPine: Tree\nOrchid: Flower",
"role": "assistant"
}
]
| Classify each of the following as a flower or a tree: rose, tulip, oak, spruce, pine, orchid |
brainstorming | [
{
"content": "Suggest 5 horror films to me",
"role": "user"
},
{
"content": "Psycho\nBabadook\nThe Exorcist\nSaw\nRosemary's Baby",
"role": "assistant"
}
]
| Suggest 5 horror films to me |
closed_qa | [
{
"content": "The history of the area now known as China has alternated between periods of prosperity, political unity, and peace and periods of war and statehood. The Yellow River nurtured China's civilization. Between eras of multiple kingdoms and warlordism, Chinese dynasties have ruled parts or all of China; in some eras control stretched as far as Xinjiang, Tibet and Inner Mongolia, as at present. The regions were occupied by other people-groups; often, non-settled peoples of the steppe identified as Mongolic, Turkic and Khitan. With thousands of years of continuous history, China is among the world's oldest civilizations and is regarded as one of the cradles of civilization. Given this paragraph about history of China, what is the name of the river that nurtured China's civilization.",
"role": "user"
},
{
"content": "The river nurtured China's civilization is named the Yellow River",
"role": "assistant"
}
]
| The history of the area now known as China has alternated between periods of prosperity, political unity, and peace and periods of war and statehood. The Yellow River nurtured China's civilization. Between eras of multiple kingdoms and warlordism, Chinese dynasties have ruled parts or all of China; in some eras control stretched as far as Xinjiang, Tibet and Inner Mongolia, as at present. The regions were occupied by other people-groups; often, non-settled peoples of the steppe identified as Mongolic, Turkic and Khitan. With thousands of years of continuous history, China is among the world's oldest civilizations and is regarded as one of the cradles of civilization. Given this paragraph about history of China, what is the name of the river that nurtured China's civilization. |
open_qa | [
{
"content": "Write a poem about a man named Chris who lives at the gym and fights monsters",
"role": "user"
},
{
"content": "There once was a man named Chris\nWho bench pressed his way to pure bliss\nWhen the plates started flying\nHe was never seen crying \nUntil a time of great peril made him miss\nAs he lay under barbell, covered in sweat\nhe peered at a creature in diss\nthis was but a danger, which tended to linger\nin the dungeons of temples of lift\nNext thing you know, Chris awoke with a blow\nto his head and his heart but to this\nHe exclaimed it was: \"nothing to worry\"\nThough the damage was done\nIt had never been fun\nTo this point life could only be bliss",
"role": "assistant"
}
]
| Write a poem about a man named Chris who lives at the gym and fights monsters |
information_extraction | [
{
"content": "A gravity hill, also known as a magnetic hill, mystery hill, mystery spot, gravity road, or anti-gravity hill, is a place where the layout of the surrounding land produces an optical illusion, making a slight downhill slope appear to be an uphill slope. Thus, a car left out of gear will appear to be rolling uphill against gravity. Hundreds of gravity hills are recognized worldwide. What are the primary features of a gravity hill given the following description?",
"role": "user"
},
{
"content": "The gravity hill optical illusion is defined by having the following characteristics:\n\n1. A downhill slope will appear to be an uphill slope\n2. Objects appear to be rolling uphill against gravity",
"role": "assistant"
}
]
| A gravity hill, also known as a magnetic hill, mystery hill, mystery spot, gravity road, or anti-gravity hill, is a place where the layout of the surrounding land produces an optical illusion, making a slight downhill slope appear to be an uphill slope. Thus, a car left out of gear will appear to be rolling uphill against gravity. Hundreds of gravity hills are recognized worldwide. What are the primary features of a gravity hill given the following description? |
closed_qa | [
{
"content": "The giant panda is a bear species endemic to China. It is a Carnivora, the giant panda is a folivore, with bamboo shoots and leaves making up more than 99% of its diet. What do giant Pandas eats?",
"role": "user"
},
{
"content": "the giant panda is a folivore, with bamboo shoots and leaves making up more than 99% of its diet.",
"role": "assistant"
}
]
| The giant panda is a bear species endemic to China. It is a Carnivora, the giant panda is a folivore, with bamboo shoots and leaves making up more than 99% of its diet. What do giant Pandas eats? |
creative_writing | [
{
"content": "You have purchased a product with which you are satisfied. Write a short review describing your experience the product: \"Unisex Anti Fog No Leaking Swimming Goggles with Adjustable Silicone for Men Women Adult Youth\".",
"role": "user"
},
{
"content": "These streamlined swimming goggles seem to very comparable in terms of quality with the other brands I've used. The coating on the lenses inhibits fog buildup, and the silicone straps are comfortable and broadly adjustable, providing a comfortable leak-proof seal for all sizes. I also love the universal style that can accommodate men or women. They're about as stylish as something like this could be.",
"role": "assistant"
}
]
| You have purchased a product with which you are satisfied. Write a short review describing your experience the product: "Unisex Anti Fog No Leaking Swimming Goggles with Adjustable Silicone for Men Women Adult Youth". |
closed_qa | [
{
"content": "The ANT catalog (or TAO catalog) is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures since 2013. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.\n\nBackground\nThe Tailored Access Operations unit has existed since the late 90s. Its mission is to collect intelligence on foreign targets of the United States by hacking into computers and telecommunication networks.\n\nIn 2012, Edward Snowden organized a CryptoParty together with Runa Sandvik, a former colleague of Jacob Appelbaum at The Tor Project. In June 2013, Snowden took internal NSA documents which he shared with Glenn Greenwald and Laura Poitras, resulting in the global surveillance disclosures. It has been speculated for years before that capabilities like those in the ANT catalog existed.\n\nPublication\nJacob Appelbaum co-authored the English publication in Der Spiegel with Christian Stöcker and Judith Horchert, which was publicized on 29 December 2013. The related English publication on the same day about the TAO by Der Spiegel was also authored by the same people, and including Laura Poitras, Marcel Rosenbach, Jörg Schindler and Holger Stark. On December 30, Appelbaum gave a lecture about \"the militarization of the Internet\" at the 30th Chaos Communication Congress in Hamburg, Germany. At the end of his talk, he encouraged NSA employees to leak more documents.\n\nApple denied the allegations that it collaborated on the development of DROPOUTJEEP in a statement to journalist Arik Hesseldahl from All Things Digital (part of the Wall Street Journal's Digital Network). The Verge questioned how the program developed in later years, since the document was composed in the early period of the iPhone and smartphones in general. Dell denied collaborating with any government in general, including the US government. John Stewart, senior vice president and chief security officer of Cisco stated that they were \"deeply concerned and will continue to pursue all avenues to determine if we need to address any new issues.\" Juniper stated that they were working actively to address any possible exploit paths. Huawei stated they would take appropriate audits to determine if any compromise had taken place and would communicate if that had taken place. NSA declined to comment on the publication by Der Spiegel.\n\nSource\nThe source who leaked the ANT catalog to the press is unknown as of 2023.\n\nAuthor James Bamford, who is specialized in the United States intelligence agencies, noted in a commentary article published by Reuters that Appelbaum has not identified the source who leaked the ANT catalog to him, which led people to mistakenly assume it was Edward Snowden. Bamford got unrestricted access to the documents cache from Edward Snowden and could not find any references to the ANT catalog using automated search tools, thereby concluding that the documents were not leaked by him. Security expert Bruce Schneier has stated on his blog that he also believes the ANT catalog did not come from Snowden, but from a second leaker. Officials at the NSA did not believe that the web crawler used by Snowden touched the ANT catalog and started looking for other people who could have leaked the catalog.\n\nContent\nThe published catalog pages were written between 2008 and 2009. The price of the items ranged from free up to $250,000.\n\nCapabilities in the ANT catalog \nPage\tCode name\tDescription\tUnit price in US$\nNSA CANDYGRAM.jpg\tCANDYGRAM\tTripwire device that emulates a GSM cellphone tower.\t40,000\nNSA COTTONMOUTH-I.jpg\tCOTTONMOUTH-I\tFamily of modified USB and Ethernet connectors that can be used to install Trojan horse software and work as wireless bridges, providing covert remote access to the target machine. COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver.\t20,300\nNSA COTTONMOUTH-II.jpg\tCOTTONMOUTH-II\tCan be deployed in a USB socket (rather than plug), and, but requires further integration in the target machine to turn into a deployed system.\t4,000\nNSA COTTONMOUTH-III.jpg\tCOTTONMOUTH-III\tStacked Ethernet and USB plug\t24,960\nNSA CROSSBEAM.jpg\tCROSSBEAM\tGSM communications module capable of collecting and compressing voice data\t4,000\nNSA CTX4000.jpg\tCTX4000\tContinuous wave radar device that can \"illuminate\" a target system for recovery of \"off net\" information.\tN/A\nNSA CYCLONE Hx9.jpg\tCYCLONE-HX9\tGSM Base Station Router as a Network-In-a-Box\t70,000\nNSA DEITYBOUNCE.jpg\tDEITYBOUNCE\tTechnology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller(s).\t0\nNSA DROPOUTJEEP.jpg\tDROPOUTJEEP\t\"A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.\"\t0\nNSA EBSR.jpg\tEBSR\tTri-band active GSM base station with internal 802.11/GPS/handset capability\t40,000\nNSA ENTOURAGE.jpg\tENTOURAGE\tDirection finding application for GSM, UMTS, CDMA2000 and FRS signals\t70,000\nNSA FEEDTROUGH.jpg\tFEEDTROUGH\tSoftware that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers.\tN/A\nNSA FIREWALK.jpg\tFIREWALK\tDevice that looks identical to a standard RJ45 socket that allows data to be injected, or monitored and transmitted via radio technology. using the HOWLERMONKEY RF transceiver. It can for instance create a VPN to the target computer.\t10,740\nNSA GENESIS.jpg\tGENESIS\tGSM handset with added software-defined radio features to record the radio frequency spectrum\t15,000\nNSA GODSURGE.jpg\tGODSURGE\tSoftware implant for a JTAG bus device named FLUXBABBITT which is added to Dell PowerEdge servers during interdiction. GODSURGE installs an implant upon system boot-up using the FLUXBABBITT JTAG interface to the Xeon series CPU.\t500\nNSA GINSU.jpg\tGINSU\tTechnology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up.\t0\nNSA GOPHERSET.jpg\tGOPHERSET\tGSM software that uses a phone's SIM card's API (SIM Toolkit or STK) to control the phone through remotely sent commands.\t0\nNSA GOURMETTROUGH.jpg\tGOURMETTROUGH\tUser-configurable persistence implant for certain Juniper Networks firewalls.\t0\nNSA HALLUXWATER.jpg\tHALLUXWATER\tBack door exploit for Huawei Eudemon firewalls.\tN/A\nNSA HEADWATER.jpg\tHEADWATER\tPersistent backdoor technology that can install spyware using a quantum insert capable of infecting spyware at a packet level on Huawei routers.\tN/A\nNSA HOWLERMONKEY.jpg\tHOWLERMONKEY\tA RF transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely.\t750\nNSA IRATEMONK.jpg\tIRATEMONK\tTechnology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital.\t0\nNSA IRONCHEF.jpg\tIRONCHEF\tTechnology that can \"infect\" networks by installing itself in a computer I/O BIOS. IRONCHEF includes also \"Straitbizarre\" and \"Unitedrake\" which have been linked to the spy software REGIN.\t0\nNSA JUNIORMINT.jpg\tJUNIORMINT\tImplant based on an ARM9 core and an FPGA.\tN/A\nNSA JETPLOW.jpg\tJETPLOW\tFirmware that can be implanted to create a permanent backdoor in a Cisco PIX series and ASA firewalls.\t0\nNSA LOUDAUTO.jpg\tLOUDAUTO\tAudio-based RF retro-reflector listening device.\t30\nNSA MAESTRO-II.jpg\tMAESTRO-II\tMulti-chip module approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz ARM7 processor, 4 MB of flash, 8 MB of RAM, and a FPGA with 500,000 gates. It replaces the previous generation modules which were based on the HC12 microcontroller.\t3,000\nNSA MONKEYCALENDAR.jpg\tMONKEYCALENDAR\tSoftware that transmits a mobile phone's location by hidden text message.\t0\nNSA NEBULA.jpg\tNEBULA\tMulti-protocol network-in-a-box system.\t250,000\nNSA NIGHTSTAND.jpg\tNIGHTSTAND\tPortable system that installs Microsoft Windows exploits from a distance of up to eight miles over a wireless connection.\tN/A\nNSA NIGHTWATCH.jpg\tNIGHTWATCH\tPortable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it.\tN/A\nNSA PICASSO.jpg\tPICASSO\tSoftware that can collect mobile phone location data, call metadata, access the phone's microphone to eavesdrop on nearby conversations.\t2,000\nNSA PHOTOANGLO.jpg\tPHOTOANGLO\tA joint NSA/GCHQ project to develop a radar system to replace CTX4000.\t40,000\nNSA RAGEMASTER.jpg\tRAGEMASTER\tA concealed device that taps the video signal from a target's computer's VGA signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most DVI ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the ferrite choke of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH.\t30\nNSA SCHOOLMONTANA.jpg\tSCHOOLMONTANA\tSoftware that makes DNT implants persistent on JUNOS-based (FreeBSD-variant) J-series routers/firewalls.\tN/A\nNSA SIERRAMONTANA.jpg\tSIERRAMONTANA\tSoftware that makes DNT implants persistent on JUNOS-based M-series routers/firewalls.\tN/A\nNSA STUCCOMONTANA.jpg\tSTUCCOMONTANA\tSoftware that makes DNT implants persistent on JUNOS-based T-series routers/firewalls.\tN/A\nNSA SOMBERKNAVE.jpg\tSOMBERKNAVE\tSoftware that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters.\t50,000\nNSA SOUFFLETROUGH.jpg\tSOUFFLETROUGH\tBIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls.\t0\nNSA SPARROW II.jpg\tSPARROW II\tA small computer intended to be used for WLAN collection, including from UAVs. Hardware: IBM Power PC 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 mini PCI slots, CompactFlash slot, and 802.11 B/G hardware. Running Linux 2.4 and the BLINDDATE software suite. Unit price (2008): $6K.\t6,000\nNSA SURLYSPAWN.jpg\tSURLYSPAWN\tKeystroke monitor technology that can be used on remote computers that are not internet connected.\t30\nNSA SWAP.jpg\tSWAP\tTechnology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows.\t0\nNSA TAWDRYYARD.jpg\tTAWDRYYARD\tRadio frequency retroreflector to provide location information.\t30\nNSA TOTECHASER.jpg\tTOTECHASER\tWindows CE implant for extracting call logs, contact lists and other information.\tN/A\nNSA TOTEGHOSTLY.jpg\tTOTEGHOSTLY\tSoftware that can be implanted on a Windows mobile phone allowing full remote control.\t0\nNSA TRINITY.jpg\tTRINITY\tMulti-chip module using a 180 MHz ARM9 processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny.\t6,250\nNSA TYPHON HX.jpg\tTYPHON HX\tNetwork-in-a-box for a GSM network with signaling and call control.\tN/A\nNSA WATERWITCH.jpg\tWATERWITCH\tA portable \"finishing tool\" that allows the operator to find the precise location of a nearby mobile phone.\tN/A\nNSA WISTFULTOLL.jpg\tWISTFULTOLL\tPlugin for collecting information from targets using Windows Management Instrumentation\t0\nFollow-up developments\nSecurity expert Matt Suiche noted that the software exploits leaked by the Shadow Brokers could be seen as genuine because it matched with names from the ANT catalog. John Bumgarner has stated to IEEE Spectrum that US government suspicion of Huawei is based on its own ability to add backdoors as shown in the ANT catalog.\n\nNSA Playset\nThe NSA Playset is an open-source project inspired by the NSA ANT catalog to create more accessible and easy to use tools for security researchers. Most of the surveillance tools can be recreated with off-the-shelf or open-source hardware and software. Thus far, the NSA Playset consists of fourteen items, for which the code and instructions can be found online on the project's homepage. After the initial leak, Michael Ossman, the founder of Great Scott Gadgets, gave a shout out to other security researchers to start working on the tools mentioned in the catalog and to recreate them. The name NSA Playset came originally from Dean Pierce, who is also a contributor (TWILIGHTVEGETABLE(GSM)) to the NSA Playset. Anyone is invited to join and contribute their own device. The requisites for an addition to the NSA Playset is a similar or already existing NSA ANT project, ease of use and a silly name (based on the original tool's name if possible). The silly name requisite is a rule that Michael Ossman himself came up with and an example is given on the project's website: \"For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH.\" The ease of use part stems also from the NSA Playset's motto: \"If a 10 year old can't do it, it doesn't count!\"\n\nName\tDescription\nTWILIGHTVEGETABLE\ta boot image for GSM communication monitoring.\nLEVITICUS\ta hand held GSM frequency analyzer disguised as a Motorola phone; named after GENESIS.\nDRIZZLECHAIR\ta hard drive with all the needed tools to crack A5/1 including the rainbow tables.\nPORCUPINEMASQUERADE\ta passive Wi-Fi reconnaissance drone.\nKEYSWEEPER\ta keylogger in form of a USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM).\nSLOTSCREAMER\ta PCI hardware implant, which can access memory and IO.\nADAPTERNOODLE\ta USB exploitation device.\nCHUKWAGON\tuses a pin on a computer's VGA port to attack via the I²C bus accessing the computer's operating system.\nTURNIPSCHOOL\ta hardware implant concealed in a USB cable which provides short range radio frequency communication capability to software running on the host computer.\nBLINKERCOUGH\ta hardware implant that is embedded in a VGA cable which allows data exfiltration.\nSAVIORBURST\ta hardware implant exploiting the JTAG interface for software application persistence; named after GODSURGE. FLUXBABBIT is replaced by SOLDERPEEK.\nCACTUSTUTU\tPortable system that enables wireless installation of Microsoft Windows exploits; covers NIGHTSTAND.\nTINYALAMO\tsoftware that targets BLE (Bluetooth Low Energy) and allows keystroke surveillance (keylogger) and injection.\nCONGAFLOCK\tRadio frequency retroreflector intended for experimentation. Intended use would be the implantation into a cable and data exfiltration based on radio reflectivity of the device.(FLAMENCOFLOCK (PS/2), TANGOFLOCK (USB), SALSAFLOCK (VGA) are retroreflectors with specific interfaces to test data exfiltration.)\nSee also\nCyberwarfare in the United States\nEquation Group\nMiniPanzer and MegaPanzer\nStuxnet\nWARRIOR PRIDE\nExplanatory notes\n Whether ANT stands for Advanced Network Technology or Access Network Technology is not known.\n The article from Der Spiegel notes that it is a \"50-page document\" and that \"nearly 50 pages\" are published. The gallery contains 49 pages. Der Spiegel also noted that the document is likely far from complete.\n If the price is listed in bulk, a calculation is made to get the unit price\n For two months\n Including installation costs\n When ordering 25 units, the price per item is US$1000\n Up to 4,000\n Varies from platform to platform\n Data Network Technologies, a division of the Tailored Access Operations\n 100 units for 625,000 Given this article about the NSA's ANT catalog, Which hacking tools are used to infect the BIOS of computers or networking devices?",
"role": "user"
},
{
"content": "DEITYBOUNCE, IRONCHEF, SOUFFLETROUGH, and SWAP are hacking tools that can be used to infect servers, computers, and networking devices.\nDEITYBOUNCE is technology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller(s).\nIRONCHEF is technology that can \"infect\" networks by installing itself in a computer I/O BIOS. \nSOUFFLETROUGH is BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls. \nSWAP is technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows.",
"role": "assistant"
}
]
| The ANT catalog (or TAO catalog) is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures since 2013. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.
Background
The Tailored Access Operations unit has existed since the late 90s. Its mission is to collect intelligence on foreign targets of the United States by hacking into computers and telecommunication networks.
In 2012, Edward Snowden organized a CryptoParty together with Runa Sandvik, a former colleague of Jacob Appelbaum at The Tor Project. In June 2013, Snowden took internal NSA documents which he shared with Glenn Greenwald and Laura Poitras, resulting in the global surveillance disclosures. It has been speculated for years before that capabilities like those in the ANT catalog existed.
Publication
Jacob Appelbaum co-authored the English publication in Der Spiegel with Christian Stöcker and Judith Horchert, which was publicized on 29 December 2013. The related English publication on the same day about the TAO by Der Spiegel was also authored by the same people, and including Laura Poitras, Marcel Rosenbach, Jörg Schindler and Holger Stark. On December 30, Appelbaum gave a lecture about "the militarization of the Internet" at the 30th Chaos Communication Congress in Hamburg, Germany. At the end of his talk, he encouraged NSA employees to leak more documents.
Apple denied the allegations that it collaborated on the development of DROPOUTJEEP in a statement to journalist Arik Hesseldahl from All Things Digital (part of the Wall Street Journal's Digital Network). The Verge questioned how the program developed in later years, since the document was composed in the early period of the iPhone and smartphones in general. Dell denied collaborating with any government in general, including the US government. John Stewart, senior vice president and chief security officer of Cisco stated that they were "deeply concerned and will continue to pursue all avenues to determine if we need to address any new issues." Juniper stated that they were working actively to address any possible exploit paths. Huawei stated they would take appropriate audits to determine if any compromise had taken place and would communicate if that had taken place. NSA declined to comment on the publication by Der Spiegel.
Source
The source who leaked the ANT catalog to the press is unknown as of 2023.
Author James Bamford, who is specialized in the United States intelligence agencies, noted in a commentary article published by Reuters that Appelbaum has not identified the source who leaked the ANT catalog to him, which led people to mistakenly assume it was Edward Snowden. Bamford got unrestricted access to the documents cache from Edward Snowden and could not find any references to the ANT catalog using automated search tools, thereby concluding that the documents were not leaked by him. Security expert Bruce Schneier has stated on his blog that he also believes the ANT catalog did not come from Snowden, but from a second leaker. Officials at the NSA did not believe that the web crawler used by Snowden touched the ANT catalog and started looking for other people who could have leaked the catalog.
Content
The published catalog pages were written between 2008 and 2009. The price of the items ranged from free up to $250,000.
Capabilities in the ANT catalog
Page Code name Description Unit price in US$
NSA CANDYGRAM.jpg CANDYGRAM Tripwire device that emulates a GSM cellphone tower. 40,000
NSA COTTONMOUTH-I.jpg COTTONMOUTH-I Family of modified USB and Ethernet connectors that can be used to install Trojan horse software and work as wireless bridges, providing covert remote access to the target machine. COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver. 20,300
NSA COTTONMOUTH-II.jpg COTTONMOUTH-II Can be deployed in a USB socket (rather than plug), and, but requires further integration in the target machine to turn into a deployed system. 4,000
NSA COTTONMOUTH-III.jpg COTTONMOUTH-III Stacked Ethernet and USB plug 24,960
NSA CROSSBEAM.jpg CROSSBEAM GSM communications module capable of collecting and compressing voice data 4,000
NSA CTX4000.jpg CTX4000 Continuous wave radar device that can "illuminate" a target system for recovery of "off net" information. N/A
NSA CYCLONE Hx9.jpg CYCLONE-HX9 GSM Base Station Router as a Network-In-a-Box 70,000
NSA DEITYBOUNCE.jpg DEITYBOUNCE Technology that installs a backdoor software implant on Dell PowerEdge servers via the motherboard BIOS and RAID controller(s). 0
NSA DROPOUTJEEP.jpg DROPOUTJEEP "A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted." 0
NSA EBSR.jpg EBSR Tri-band active GSM base station with internal 802.11/GPS/handset capability 40,000
NSA ENTOURAGE.jpg ENTOURAGE Direction finding application for GSM, UMTS, CDMA2000 and FRS signals 70,000
NSA FEEDTROUGH.jpg FEEDTROUGH Software that can penetrate Juniper Networks firewalls allowing other NSA-deployed software to be installed on mainframe computers. N/A
NSA FIREWALK.jpg FIREWALK Device that looks identical to a standard RJ45 socket that allows data to be injected, or monitored and transmitted via radio technology. using the HOWLERMONKEY RF transceiver. It can for instance create a VPN to the target computer. 10,740
NSA GENESIS.jpg GENESIS GSM handset with added software-defined radio features to record the radio frequency spectrum 15,000
NSA GODSURGE.jpg GODSURGE Software implant for a JTAG bus device named FLUXBABBITT which is added to Dell PowerEdge servers during interdiction. GODSURGE installs an implant upon system boot-up using the FLUXBABBITT JTAG interface to the Xeon series CPU. 500
NSA GINSU.jpg GINSU Technology that uses a PCI bus device in a computer, and can reinstall itself upon system boot-up. 0
NSA GOPHERSET.jpg GOPHERSET GSM software that uses a phone's SIM card's API (SIM Toolkit or STK) to control the phone through remotely sent commands. 0
NSA GOURMETTROUGH.jpg GOURMETTROUGH User-configurable persistence implant for certain Juniper Networks firewalls. 0
NSA HALLUXWATER.jpg HALLUXWATER Back door exploit for Huawei Eudemon firewalls. N/A
NSA HEADWATER.jpg HEADWATER Persistent backdoor technology that can install spyware using a quantum insert capable of infecting spyware at a packet level on Huawei routers. N/A
NSA HOWLERMONKEY.jpg HOWLERMONKEY A RF transceiver that makes it possible (in conjunction with digital processors and various implanting methods) to extract data from systems or allow them to be controlled remotely. 750
NSA IRATEMONK.jpg IRATEMONK Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate, and Western Digital. 0
NSA IRONCHEF.jpg IRONCHEF Technology that can "infect" networks by installing itself in a computer I/O BIOS. IRONCHEF includes also "Straitbizarre" and "Unitedrake" which have been linked to the spy software REGIN. 0
NSA JUNIORMINT.jpg JUNIORMINT Implant based on an ARM9 core and an FPGA. N/A
NSA JETPLOW.jpg JETPLOW Firmware that can be implanted to create a permanent backdoor in a Cisco PIX series and ASA firewalls. 0
NSA LOUDAUTO.jpg LOUDAUTO Audio-based RF retro-reflector listening device. 30
NSA MAESTRO-II.jpg MAESTRO-II Multi-chip module approximately the size of a dime that serves as the hardware core of several other products. The module contains a 66 MHz ARM7 processor, 4 MB of flash, 8 MB of RAM, and a FPGA with 500,000 gates. It replaces the previous generation modules which were based on the HC12 microcontroller. 3,000
NSA MONKEYCALENDAR.jpg MONKEYCALENDAR Software that transmits a mobile phone's location by hidden text message. 0
NSA NEBULA.jpg NEBULA Multi-protocol network-in-a-box system. 250,000
NSA NIGHTSTAND.jpg NIGHTSTAND Portable system that installs Microsoft Windows exploits from a distance of up to eight miles over a wireless connection. N/A
NSA NIGHTWATCH.jpg NIGHTWATCH Portable computer used to reconstruct and display video data from VAGRANT signals; used in conjunction with a radar source like the CTX4000 to illuminate the target in order to receive data from it. N/A
NSA PICASSO.jpg PICASSO Software that can collect mobile phone location data, call metadata, access the phone's microphone to eavesdrop on nearby conversations. 2,000
NSA PHOTOANGLO.jpg PHOTOANGLO A joint NSA/GCHQ project to develop a radar system to replace CTX4000. 40,000
NSA RAGEMASTER.jpg RAGEMASTER A concealed device that taps the video signal from a target's computer's VGA signal output so the NSA can see what is on a targeted desktop monitor. It is powered by a remote radar and responds by modulating the VGA red signal (which is also sent out most DVI ports) into the RF signal it re-radiates; this method of transmission is codenamed VAGRANT. RAGEMASTER is usually installed/concealed in the ferrite choke of the target cable. The original documents are dated 2008-07-24. Several receiver/demodulating devices are available, e.g. NIGHTWATCH. 30
NSA SCHOOLMONTANA.jpg SCHOOLMONTANA Software that makes DNT implants persistent on JUNOS-based (FreeBSD-variant) J-series routers/firewalls. N/A
NSA SIERRAMONTANA.jpg SIERRAMONTANA Software that makes DNT implants persistent on JUNOS-based M-series routers/firewalls. N/A
NSA STUCCOMONTANA.jpg STUCCOMONTANA Software that makes DNT implants persistent on JUNOS-based T-series routers/firewalls. N/A
NSA SOMBERKNAVE.jpg SOMBERKNAVE Software that can be implanted on a Windows XP system allowing it to be remotely controlled from NSA headquarters. 50,000
NSA SOUFFLETROUGH.jpg SOUFFLETROUGH BIOS injection software that can compromise Juniper Networks SSG300 and SSG500 series firewalls. 0
NSA SPARROW II.jpg SPARROW II A small computer intended to be used for WLAN collection, including from UAVs. Hardware: IBM Power PC 405GPR processor, 64 MB SDRAM, 16 MB of built-inflash, 4 mini PCI slots, CompactFlash slot, and 802.11 B/G hardware. Running Linux 2.4 and the BLINDDATE software suite. Unit price (2008): $6K. 6,000
NSA SURLYSPAWN.jpg SURLYSPAWN Keystroke monitor technology that can be used on remote computers that are not internet connected. 30
NSA SWAP.jpg SWAP Technology that can reflash the BIOS of multiprocessor systems that run FreeBSD, Linux, Solaris, or Windows. 0
NSA TAWDRYYARD.jpg TAWDRYYARD Radio frequency retroreflector to provide location information. 30
NSA TOTECHASER.jpg TOTECHASER Windows CE implant for extracting call logs, contact lists and other information. N/A
NSA TOTEGHOSTLY.jpg TOTEGHOSTLY Software that can be implanted on a Windows mobile phone allowing full remote control. 0
NSA TRINITY.jpg TRINITY Multi-chip module using a 180 MHz ARM9 processor, 4 MB of flash, 96 MB of SDRAM, and a FPGA with 1 million gates. Smaller than a penny. 6,250
NSA TYPHON HX.jpg TYPHON HX Network-in-a-box for a GSM network with signaling and call control. N/A
NSA WATERWITCH.jpg WATERWITCH A portable "finishing tool" that allows the operator to find the precise location of a nearby mobile phone. N/A
NSA WISTFULTOLL.jpg WISTFULTOLL Plugin for collecting information from targets using Windows Management Instrumentation 0
Follow-up developments
Security expert Matt Suiche noted that the software exploits leaked by the Shadow Brokers could be seen as genuine because it matched with names from the ANT catalog. John Bumgarner has stated to IEEE Spectrum that US government suspicion of Huawei is based on its own ability to add backdoors as shown in the ANT catalog.
NSA Playset
The NSA Playset is an open-source project inspired by the NSA ANT catalog to create more accessible and easy to use tools for security researchers. Most of the surveillance tools can be recreated with off-the-shelf or open-source hardware and software. Thus far, the NSA Playset consists of fourteen items, for which the code and instructions can be found online on the project's homepage. After the initial leak, Michael Ossman, the founder of Great Scott Gadgets, gave a shout out to other security researchers to start working on the tools mentioned in the catalog and to recreate them. The name NSA Playset came originally from Dean Pierce, who is also a contributor (TWILIGHTVEGETABLE(GSM)) to the NSA Playset. Anyone is invited to join and contribute their own device. The requisites for an addition to the NSA Playset is a similar or already existing NSA ANT project, ease of use and a silly name (based on the original tool's name if possible). The silly name requisite is a rule that Michael Ossman himself came up with and an example is given on the project's website: "For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH." The ease of use part stems also from the NSA Playset's motto: "If a 10 year old can't do it, it doesn't count!"
Name Description
TWILIGHTVEGETABLE a boot image for GSM communication monitoring.
LEVITICUS a hand held GSM frequency analyzer disguised as a Motorola phone; named after GENESIS.
DRIZZLECHAIR a hard drive with all the needed tools to crack A5/1 including the rainbow tables.
PORCUPINEMASQUERADE a passive Wi-Fi reconnaissance drone.
KEYSWEEPER a keylogger in form of a USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM).
SLOTSCREAMER a PCI hardware implant, which can access memory and IO.
ADAPTERNOODLE a USB exploitation device.
CHUKWAGON uses a pin on a computer's VGA port to attack via the I²C bus accessing the computer's operating system.
TURNIPSCHOOL a hardware implant concealed in a USB cable which provides short range radio frequency communication capability to software running on the host computer.
BLINKERCOUGH a hardware implant that is embedded in a VGA cable which allows data exfiltration.
SAVIORBURST a hardware implant exploiting the JTAG interface for software application persistence; named after GODSURGE. FLUXBABBIT is replaced by SOLDERPEEK.
CACTUSTUTU Portable system that enables wireless installation of Microsoft Windows exploits; covers NIGHTSTAND.
TINYALAMO software that targets BLE (Bluetooth Low Energy) and allows keystroke surveillance (keylogger) and injection.
CONGAFLOCK Radio frequency retroreflector intended for experimentation. Intended use would be the implantation into a cable and data exfiltration based on radio reflectivity of the device.(FLAMENCOFLOCK (PS/2), TANGOFLOCK (USB), SALSAFLOCK (VGA) are retroreflectors with specific interfaces to test data exfiltration.)
See also
Cyberwarfare in the United States
Equation Group
MiniPanzer and MegaPanzer
Stuxnet
WARRIOR PRIDE
Explanatory notes
Whether ANT stands for Advanced Network Technology or Access Network Technology is not known.
The article from Der Spiegel notes that it is a "50-page document" and that "nearly 50 pages" are published. The gallery contains 49 pages. Der Spiegel also noted that the document is likely far from complete.
If the price is listed in bulk, a calculation is made to get the unit price
For two months
Including installation costs
When ordering 25 units, the price per item is US$1000
Up to 4,000
Varies from platform to platform
Data Network Technologies, a division of the Tailored Access Operations
100 units for 625,000 Given this article about the NSA's ANT catalog, Which hacking tools are used to infect the BIOS of computers or networking devices? |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.