# 2019 LanguageModelsAreUnsupervisedMu

Subject Headings: Language Model; Artificial Neural Network; GPT-2 OpenAI GPT.

## Notes

• Supplemental Content:

## Quotes

### Abstract

Natural language processing tasks, such as question answering, machine translation, reading comprehension, and summarization, are typically approached with supervised learning on task specific datasets. We demonstrate that language models begin to [[learn [[these tasks without any explicit supervision when trained on a new dataset of millions of webpages called WebText. When conditioned on a document plus questions, the answers generated by the language model reach 55 F1 on the CoQA dataset matching or exceeding the performance of 3 out of 4 baseline systems without using the 127, 000 + training examples. The capacity of the language model is essential to the success of zero-shot task transfer and increasing it improves performance in a log-linear fashion across tasks. Our largest model, GPT-2, is a 1.5B parameter Transformer that achieves state of the art results on 7 out of 8 tested language modeling datasets in a zero-shot setting but still underfits WebText. Samples from the model reflect these improvements and contain coherent paragraphs of text. These findings suggest a promising path towards building language processing systems which learn to perform tasks from their naturally occurring demonstrations.

### 1. Introduction

Machine learning systems now excel (in expectation) at tasks they are trained for by using a combination of large datasets, high-capacity models, and supervised learning (Krizhevsky et a1., 2012, Sutskever et a1., 2014, Amodei et a1., 2016). Yet these systems are brittle and sensitive to slight changes in the data distribution (Recht et a1., 2018) and task speciﬁcation (Kirkpatrick et a1., 2017). Current systems are better characterized as narrow experts rather than competent generalists. We would like to move towards more general systems Which can perform many tasks — eventually without the need to manually create and label a [training dataset]] for each one.

The dominant approach to creating ML systems is to collect a dataset of training examples demonstrating correct behavior for a desired task, train a system to imitate these behaviors, and then test its performance on independent and identically distributed (IID) held—out examples. This has served well to make progress on narrow experts. But the often erratic behavior of captioning models (Lake et a1., 2017), reading comprehension systems (Jia & Liang, 2017), and image classiﬁers (Alcorn et a1., 2018) on the diversity and variety of possible inputs highlights some of the shortcomings of this approach.

Our suspicion is that the prevalence of single task training on single [[[domain dataset]]s is a major contributor to the lack of generalization observed in current systems. Progress towards robust systems with current architectures is likely to require [[training] and [[measuring] performance on a wide range of domains and tasks. Recently, several benchmarks have been proposed such as GLUE (Wang et a1., 2018) and decaNLP (McCann et a1., 2018) to begin studying this. Multitask learning (Caruana, 1997) is a promising framework for improving general [p[erformance]]. However, multitask training in NLP is still nascent. Recent work reports modest performance improvements (Yogatama et a1., 2019) and the two most ambitious efforts to date have trained on a total of 10 and 17 (dataset, objective) pairs respectively (McCann et a1., 2018), Bowman et a1., 2018). From a meta—learning perspective, each (dataset, objective) pair is a single training example sampled from the distribution of datasets and objectives. Current ML systems need hundreds to thousands of examples to induce functions which generalize well. This suggests that multitask training many need just as many effective training pairs to realize its promise with current approaches. It will be very difﬁcult to continue to [scale]] the creation of datasets and the design of objectives to the degree that may be required to brute force our way there with current techniques. This motivates exploring additional setups for performing multitask learning.

The current best performing systems on language tasks utilize a combination of pre—training and supervised ﬁne-tuning. This approach has a long history with a trend towards more ﬂexible forms of transfer. First, word vectors were learned and used as inputs to task—speciﬁc architectures (Mikolov et al., 2013, Collobert et al., 2011), then the contextual representations of recurrent networks were transferred (Dai & Le, 2015, Peters et al., 2018), and recent work suggests that task—speciﬁc architectures are no longer necessary and transferring many self-attention blocks is sufﬁcient (Radford et al., 2018, Devlin et al., 2018).

These methods still require supervised training in order to perform a task. When only minimal or no supervised data is available, another line of work has demonstrated the promise of language models to perform speciﬁc tasks, such as commonsense reasoning (Schwartz et al., 2017) and sentiment analysis (Radford et al., 2017).

In this paper, we connect these two lines of work and continue the trend of more general methods of transfer. We demonstrate language models can perform down-stream tasks in a zero-shot] setting - without any parameter] or architecture modiﬁcation. We demonstrate this [approach]] shows potential by highlighting the ability of language models to perform a wide range of tasks in a zero-shot setting. We achieve promising, competitive, and state of the art results depending on the [[tas]k].

### 2. Approach

At the core of our approach is language modeling. Language modeling is usually framed as unsupervised distribution estimation from a set of examples $(x_1, x_2,\cdots ,x_n)$ each composed of variable length sequences of symbols $(s_1, s_2, \cdots, s_5)$. Since [language]] has a natural sequential ordering, it is common to factorize the joint probabilities over symbols as the product of conditional probabilities (Jelinek & Mercer, 1980, Bengio et al., 2003):

$p(x)=\displaystyle \prod_{i=1}^n p\left(s_n|s_1,\cdots,s_{n-1}\right) \quad \quad (1)$

This approach allows for tractable sampling from and [estimation]] of $p(x)$ as well as any [conditional]]s of the form $p(s_{n-k},\cdots, s_n|s_1, \cdots, s_{n-k-1})$ In recent years, there have been signiﬁcant improvements in the expressiveness of models that can compute these conditional probabilities, such as self—attention architectures like the Transformer (Vaswani et al., 2017).

Learning to perform a single task can be expressed in a probabilistic framework as estimating a conditional distribution p(output|input). Since a general system should be able to [[[perform]] many different tasks, even for the same input, it should condition not only on the input but also on the task to be performed. That is, it should model p(output|input, task). This has been variously formalized in multitask and meta-learning [[setting]s. Task conditioning is often implemented at an architectural level, such as the task speciﬁc encoders and [[decoder]s in (Kaiser et al., 2017) or at an algorithmic level such as the inner and outer loop optimization framework of MAML (Finn et al., 2017). But as exempliﬁed in McCann et al. (2018), language provides a ﬂexible way to specify tasks, inputs, and outputs all as a sequence of symbols. For example, a translation training example can be written as the sequence (translate to french, english text, french text). Likewise, a reading comprehension training example can be written as (answer the question, document, question , answer). McCann et al. (2018) demonstrated it was possible to train a single model, the MQAN, to infer and perform many different tasks on examples with this type of format.

Language modeling is also able to, in principle, learn the tasks of McCann et al. (2018) without the need for explicit supervision of which symbols are the outputs to be predicted. Since the supervised objective is the same as the unsupervised objective but only evaluated on a subset of the sequence, the global minimum of the unsupervised objective is also the global minimumof the supervised objective. In this slightly toy setting, the concerns with density estimation as a principled training objective discussed in ([[[[[Sutskever et al., 2015]) are [[[side step]]ped. The problem instead becomes whether we are able to, in practice, optimize the unsupervised objective to convergence. Preliminary experiments conﬁrmed that sufﬁciently large language models are able to perform multitask learning in this toy—ish setup but learning is much slower than in explicitly supervised approaches.

While it is a large step from the well-posed setup described above to the messiness of “language in the wild”, Weston (2016) argues, in the context of dialog, for the need to develop systems capable of learning from natural language directly and demonstrated a proof of conceptlearning a QA task without a reward signal by using forward prediction of a teacher’s outputs. While dialog is an attractive approach, we worry it is overly restrictive. The internet contains a vast amount of information that is passively available without the need for interactive communication. Our speculation is that a language model with sufﬁcient capacity will begin to learn to infer and perform the tasks demonstrated in natural language sequences in order to better predict them, regardless of their method of procurement. If a [language model]] is able to do this it will be, in effect, performing unsupervised multitask learning. We test whether this is the case by analyzing the performance of language models in a zero-shot [[setting] on awide variety of tasks.

#### 2.1. Training Dataset

Most prior work trained language models on a single do— main of text, such as news articles (Iozefowicz et al., 2016), Wikipedia (Merity et al., 2016), or ﬁction books (Kiros et al., 2015). Our approach motivates building as large and diverse a dataset as possible in order to collect natural lan— guage demonstrations of tasks in as varied of domains and contexts as possible.

A promising source of diverse and nearly unlimited text is web scrapes such as Common Crawl. While these archives are many orders of magnitude larger than current language modeling datasets, they have signiﬁcant data quality issues. Trinh & Le (2018) used Common Crawl in their work on commonsense reasoning but noted a large amount of doc— uments “whose content are mostly unintelligible”. We ob— served similar data issues in our initial experiments with

 ”I’m not the cleverest man in the world, but like they say in French: Je ne suis pas un imbecile &%91;I’m not a fool]. In a now—deleted post from Aug. 16, Soheil Eid, Tory candidate in the riding of Joliette, wrote in French: ”Mentez mentez, il en restera toujours quelque chose”, which translates as, ”Lie lie and something will always remain”. “I hate the word "perfume", Burr says. ‘It’s somewhat better in French: "parfum". If listened carefully at 29:55, a conversation can be heard between two guys in French: “-Comment on fait pour aller de l’autre coté? -Quel autre coté?”, which means “- How do you get to the other side? - What side?”. If this sounds like a bit of a stretch, consider this question in French: As-tu aller au cinéma?, or Did you go to the movies?, which literally translates as Have—you to go to movies/theater? “Brevet Sans Garantie Du Gouvernement”, translated to English: “Patented without government warranty”.

Common Crawl. Trinh & Le (2018)’s best results were achieved using a small subsarnple of Common Crawl which included only documents most similar to their target dataset, the Winograd Schema Challenge. While this is a pragmatic approach to improve performance on a speciﬁc task, we want to avoid making assumptions about the tasks to be performed ahead of time.

Instead, we created a new web scrape which emphasizes document quality. To do this we only scraped web pages which have been curated/ﬁltered by humans. Manually ﬁltering a full web scrape would be exceptionally expensive so as a starting point, we scraped all outbound links from Reddit, a social media platform, which received at least 3 karma. This can be thought of as a heuristic indicator for whether other users found the link interesting, educational, or just funny.

The resulting dataset, WebText, contains the text subset of these 45 million links. To extract the text from HTML responses we use a combination of the Dragnet (Peters & Lecocq, 2013) and Newspaper[1] content extractors. All re— sults presented in this paper use a preliminary version of WebText which does not include links created after Dec 2017 and which after de—duplication and some heuristic based cleaning contains slightly over 8 million documents for a total of 40 GB of text. We removed all Wikipedia documents from WebTeXt since it is a common data source for other datasets and could complicate analysis due to over— lapping training data with test evaluation tasks.

#### 2.2. Input Representation

A general language model (LM) should be able to compute the probability of (and also generate) any string. Current large scale LMs include pre—processing steps such as lower— casing, tokenization, and out—of—Vocabulary tokens which restrict the space of model—able strings. While processing Unicode strings as a sequence of UTF—8 bytes elegantly ful— ﬁlls this requirernent as exempliﬁed in work such as Gillick et al. (2015), current byte—level LMs are not competitive with word—level LMs on large scale datasets such as the One Billion Word Benchmark (Al—Rfou et al., 2018). We observed a similar performance gap in our own attempts to train standard byte—level LMs on WebTeXt.

Byte Pair Encoding (BPE) (Sennrich et al., 2015) is a practical middle ground between character and word level language modeling which effectively interpolates between word level inputs for frequent symbol sequences and char— acter level inputs for infrequent symbol sequences. Despite its name, reference BPE implementations often operate on Unicode code points and not byte sequences. These imple— mentations would require including the full space of Uni— code symbols in order to model all Unicode strings. This would result in a base vocabulary of over 130,000 before any multi—symbol tokens are added. This is prohibitively large compared to the 32,000 to 64,000 token vocabularies often used with BPE. In contrast, a byte—level version of BPE only requires a base vocabulary of size 256. However, directly applying BPE to the byte sequence results in sub— optimal merges due to BPE using a greedy frequency based heuristic for building the token vocabulary. We observed BPE including many versions of common words like dog since they occur in many variations such as dog . dog! dog? . This results in a sub—optimal allocation of limited vocabulary slots and model capacity. To avoid this, we pre— vent BPE from merging across character categories for any byte sequence. We add an exception for spaces which sig— niﬁcantly improves the compression efﬁciency while adding only minimal fragmentation of words across multiple vocab tokens.

This input representation allows us to combine the empirical beneﬁts of word—level LMs with the generality of byte—level approaches. Since our approach can assign a probability to any Unicode string, this allows us to evaluate our LMs on any dataset regardless of pre—processing, tokenization, or vocab size.

#### 2.3. Model

We use a Transformer (Vaswani et al., 2017) based architecture for our [LM]]s. The model largely follows the details of the OpenAI GPT model (Radford et al., 2018) with a few modifications. Layer normalization (Ba et al., 2016) was moved to the input of each sub-block, similar to a pre-activation residual network (He et al., 2016) and an additional layer normalization was added after the final self-attention block. A modified initialization which accounts for the accumulation on the residual path with model depth is used. We scale the weights of residual layers at initialization by a factor of $1 /\sqrt{N}$ where $N$ is the number of residual layers. The vocabulary is expanded to 50,257. We also increase the context size from 512 to 1024 tokens and a larger [batch size]] of 512 is used.

### 3. Experiments

We trained and benchmarked four LMs with approximately log-uniformly spaced sizes. The architectures are summarized in Table 2. The smallest model is equivalent to the original GPT, and the second smallest equivalent to the largest model from BERT (Devlin et al., 2018). Our largest model, which we call GPT-2, has over an order of magnitude more parameters than GPT. The learning rate of each model was manually tuned for the best perplexity on a 5% held—out sample of WebTeXt. All models still underﬁt WebText and held—out perplexity has as of yet improved given more training time.

Parameters Layers dmodel
117M 12 768
345M 24 1024
762M 36 1280
1542M 48 1600
Table 2. Architecture hyperpararmeters for the 4 model sizes.

#### 3.1. Language Modeling

As an initial step towards zero—shot task transfer, we are interested in understanding how WebText LM’s perform at zero—shot domain transfer on the primary task they are trained for — language modeling. Since our model operates on a byte level and does not require lossy pre—processing or tokenization, we can evaluate it on any language model benchmark. Results on language modeling datasets are commonly reported in a quantity which is a scaled or ex— ponentiated version of the average negative log probability per canonical prediction unit — usually a character, a byte, or a word. We evaluate the same quantity by computing the log—probability of a dataset according to a WebTeXt LM and dividing by the number of canonical units. For many of these datasets, WebText LMs would be tested signiﬁcantly out— of—distribution, having to predict aggressively standardized text, tokenization artifacts such as disconnected punctuation and contractions, shufﬂed sentences, and even the string <UNK> which is extremely rare in WebText — occurring only 26 times in 40 billion bytes. We report our main re— sults in Table 3 using invertible de—tokenizers which remove as many of these tokenization / pre—processing artifacts as possible. Since these de—tokenizers are invertible, we can still calculate the log probability of a dataset and they can be thought of as a simple form of domain adaptation. We observe gains of 2.5 to 5 perplexity for GPT—2 with these de—tokenizers.

 LAMBADA LAMBADA CB T— CN CBT—NE WikiText2 PTB enwik8 text8 WikiText103 lBW (PPL) (ACC) (ACC) (ACC) (PPL) (PPL) (BPB) (BPC) (PPL) (PPL) SOTA 99.8 59.23 85.7 82.3 39.14 46.54 0.99 1.08 18.3 21.8 117M 35.13 45.99 87.65 83.4 29.41 65.85 1.16 1.17 37.50 75.20 345M 15.60 55.48 92.35 87.1 22.76 47.33 1.01 1.06 26.37 55.72 762M 10.87 60.12 93.45 88.0 19.93 40.31 0.97 1.02 22.05 44.575 1542M 8.63 63.24 93.30 89.05 18.34 35.76 0.93 0.98 17.48 42.16

WebText LMs transfer well across domains and datasets, improving the state of the art on 7 out of the 8 datasets in a zero—shot setting. Large improvements are noticed on small datasets such as Penn Treebank and WikiTeXt—2 which have only 1 to 2 million training tokens. Large improvements are also noticed on datasets created to measure long—term dependencies like LAMBADA (Paperno et al., 2016) and the Children’s Book Test (Hill et al., 2015). Our model is still signiﬁcantly worse than prior work on the One Billion Word Benchmark (Chelba et al., 2013). This is likely due to a combination of it being both the largest dataset and having some of the most destructive pre—processing — lBW’s sentence level shufﬂing removes all long—range structure.

#### 3.2. Children’s Book Test

Figure 2. Performance on the Children’s Book Test as a function of model capacity. Human performance are from Bajgar et al. (2016), instead of the much lower estimates from the original paper.

The Children’s Book Test (CBT) (Hill et al., 2015) was created to examine the performance of LMs on different cat— egories of words: narned entities, nouns, verbs, and preposi— tions. Rather than reporting perplexity as an evaluation met— ric, CBT reports accuracy on an automatically constructed cloze test where the task is to predict which of 10 possible choices for an omitted word is correct. Following the LM approach introduced in the original paper, we compute the probability of each choice and the rest of the sentence con— ditioned on this choice according to the LM, and predict the one with the highest probability. As seen in Figure 2 performance steadily improves as model size is increased and closes the majority of the gap to human performance on this test. Data overlap analysis showed one of the CBT test set books, The Jungle Book by Rudyard Kipling, is in WebText, so we report results on the validation set which has no signiﬁcant overlap. GPT—2 achieves new state of the art results of 93.3% on common nouns and 89.1% on narned entities. A de—tokenizer was applied to remove PTB style tokenization artifacts from CB T.

The LAMBADA dataset (Paperno et al., 2016) tests the ability of systems to model long—range dependencies in text. The task is to predict the ﬁnal word of sentences which require at least 50 tokens of context for a human to successfully predict. GPT—2 improves the state of the art from 99.8 (Grave et al., 2016) to 8.6 perplexity and increases the accuracy of LMs on this test from 19% (Dehghani et al., 2018) to 52.66%. Investigating GPT—2’s errors showed rnost predictions are valid continuations of the sentence, but are not valid ﬁnal words. This suggests that the LM is not using the additional useful constraint that the word must be the ﬁnal of the sentence. Adding a stop—word ﬁlter as an approximation to this further increases accuracy to 63.24%, improving the overall state of the art on this task by 4%. The previous state of the art (Hoang et al., 2018) used a different restricted prediction setting where the outputs of the model were constrained to only words that appeared in the context. For GPT—2, this restriction is harmful rather than helpful since 19% of answers are not in context. We use a version of the dataset without preprocessing.

Figure 3. Performance on the Winograd Schema Challenge as a function of model capacity.

The Winograd Schema challenge (Levesque et al., 2012) was constructed to measure the capability of a system to perform commonsense reasoning by measuring its ability to resolve ambiguities in text. Recently Trinh & Le (2018) demonstrated signiﬁcant progress on this challenge using LMs, by predicting the resolution of the ambiguity with higher probability. We follow their problem formulation and Visualize the performance of our models with both full and partial scoring techniques in Figure 3. GPT—2 improves state of the art accuracy by 7%, achieving 70.70%. The dataset is quite small with only 273 examples so we recommend reading Trichelair et al. (2018) to help contextualize this result.

The Conversation Question Answering dataset (CoQA) Reddy et al. (2018) consists of documents from 7 different domains paired with natural language dialogues between a question asker and a question answerer about the document. CoQA tests reading comprehension capabilities and also the ability of models to answer questions that depend on conversation history (such as “Why?”).

Greedy decoding from GPT—2 when conditioned on a doc— ument, the history of the associated conversation, and a ﬁnal token A: achieves 55 F1 on the development set. This matches or exceeds the performance of 3 out of 4 base— line systems without using the 127,000+ manually collected question answer pairs those baselines were trained on. The supervised SOTA, a BERT based system (Devlin et al., 2018), is nearing the 89 F1 performance of humans. \Vhile GPT—2’s performance is exciting for a system without any su— pervised training, sorne inspection of its answers and errors suggests GPT—2 often uses simple retrieval based heuristics such as answer with a name from the document in response to a who question.

 R—l R—2 R-L R—AVG Bottom—Up Sum 41.22 18.68 38.34 32.75 Lede-3 40.38 17.66 36.62 31.55 Seq2Seq + Attn 31.33 11.81 28.83 23.99 GPT—2 TL; DR: 29.34 8.27 26.58 21.40 Random—3 28.78 8.63 25.52 20.98 GPT—2 no hint 21.58 4.03 19.47 15.03

#### 3.6. Summarization

We test GPT—2’s ability to perform summarization on the CNN and Daily Mail dataset (Nallapati et al., 2016). To in— duce summarization behavior we add the text TL; DR: after the article and generate 100 tokens with Top—k random sam— pling (Fan et al., 2018) with k : 2 which reduces repetition and encourages rnore abstractive summaries than greedy de— coding. We use the ﬁrst 3 generated sentences in these 100 tokens as the summary. \Vhile qualitatively the generations resemble summaries, as shown in Table 14, they often focus on recent content from the article or confuse speciﬁc details such as how many cars were involved in a crash or whether a logo was on a hat or shirt. On the commonly reported ROUGE 1,2,L metrics the generated summaries only begin to approach the performance of classic neural baselines and just barely outperforms selecting 3 random sentences from the article. GPT—2’s performance drops by 6.4 points on the aggregate metric when the task hint is removed which demonstrates the ability to invoke task speciﬁc behavior in a language model with natural language.

#### 3.7. Translation

We test whether GPT—2 has begun to learn how to translate from one language to another. In order to help it infer that this is the desired task, we condition the language model on a context of example pairs of the format english sentence : french sentence and then after a ﬁ— nal prompt of engli sh sentence : we sample from the model with greedy decoding and use the ﬁrst generated sentence as the translation. On the WMT—14 English—French test set, GPT—2 gets 5 BLEU, which is slightly worse than a word—by—word substitution with a bilingual lexicon in— ferred in previous work on unsupervised word translation (Conneau et al., 2017b). On the WMT—14 French—English test set, GPT—2 is able to leverage its very strong English language model to perform signiﬁcantly better, achieving 11.5 BLEU. This outperforms several unsupervised machine translation baselines frorn (Artetxe et al., 2017) and (Larnple et al., 2017) but is still much worse than the 33.5 BLEU of the current best unsupervised machine translation approach (Artetxe et al., 2019). Performance on this task was sur— prising to us, since we deliberately removed non—English webpages from WebTeXt as a ﬁltering step. In order to con— ﬁrm this, we ran a byte—level language detector[2] on WebTeXt which detected only 10MB of data in the French language which is approximately 500x smaller than the monolingual French corpus common in prior unsupervised machine trans— lation research.

Who wrote the book the origin of species? Charles Darwin 83.4%
Who is the founder of the ubuntu project? Mark Shuttleworth 82.0%
Who is the quarterback for the green bay packers? Aaron Rodgers 81.1%
Panda is a national animal of which country? China 76.8%
Who came up with the theory of relativity? Albert Einstein 76.4%
When was the ﬁrst star wars ﬁlm released? 1977 71.4%
What is the most common blood type in sweden? A 70.6%
Who is regarded as the founder of psychoanalysis? Sigmund Freud 69.3%
Who took the ﬁrst steps on the moon in 1969? Neil Armstrong 66.8%
Who is the largest supermarket chain in the uk? Tesco 65.3%
What is the meaning of shalom in english? peace 64.0%
Who was the author of the art of war? Sun Tzu 59.6%
Largest state in the us by land mass? California 59.2%
Green algae is an example of which type of reproduction? parthenogenesis 56.5%
Vikram samvat calender is ofﬁcial in which country? India 55.6%
Who is mostly responsible for writing the declaration of independence? Thomas Jefferson 53.3%
What us state forms the western boundary of montana? Montana 52.3%
Who plays ser davos in game of thrones? Peter Dinklage 52.1%
Who appoints the chair of the federal reserve system? Janet Yellen 51.5%
State the process that divides one nucleus into two genetically identical nuclei? mitosis 50.7%
Who won the most mvp awards in the nba? Michael Jordan 50.2%
What river is associated with the city of rome? the Tiber 48.6%
Who is the ﬁrst president to be impeached? Andrew Johnson 48.3%
Who is the head of the department ofhomeland security 2017? John Kelly 47.0%
What is the name given to the common currency to the european union? Euro 46.8%
What was the emperor name in star wars? Palpatine 46.5%
Do you have to have a gun permit to shoot at a range? No 46.4%
Who proposed evolution in 1859 as the basis of biological development? Charles Darwin 45.7%
Nuclear power plant that blew up in russia? Chernobyl 45.7%
Who played john connor in the original terminator? Arnold Schwarzenegger 45.2%
Table 5. The 30 most conﬁdent answers generated by GPT—2 on the development set of Natural Questions sorted by their probability according to GPT—2. None of these questions appear in WebText according to the procedure described in Section 4.

 PTB WikiText—2 enwik8 text8 Wikitext— 103 lBW Dataset train 2.67% 0.66% 7.50% 2.34% 9.09 % 13.19% WebText train 0.88% 1.63% 6.31% 3.94% 2.42% 3.75%

### 4. Generalization vs Memorization

Recent work in computer Vision has shown that common im— age datasets contain a non—triVial amount of near—duplicate images. For instance CIFAR—lO has 3.3% overlap between train and test images (Barz & Denzler, 2019). This results in an over—reporting of the generalization performance of ma— chine learning systems. As the size of datasets increases this issue becomes increasingly likely which suggests a similar phenomena could be happening with WebTeXt. Therefore it is important to analyze how much test data also shows up in the training data.

To study this we created Bloom ﬁlters containing 8—grams of WebText training set tokens. To improve recall, strings were normalized to contain only lower—cased alphanumeric words with a single space as a delimiter. The Bloom ﬁlters were constructed such that the false positive rate is upper bounded by \$. We further veriﬁed the low false positive rate by generating 1M strings, of which zero were found by the ﬁlter.

These Bloom ﬁlters let us calculate, given a dataset, the percentage of 8—grams from that dataset that are also found in the WebTeXt training set. Table 6 shows this overlap anal— ysis for the test sets of common LM benchmarks. Common LM datasets’ test sets have between 1—6% overlap with Web— Text train, with an average of overlap of 3.2%. Somewhat surprisingly, many datasets have larger overlaps with their own training splits, with an average of 5.9% overlap.

Our approach optimizes for recall, and while manual inspec— tion of the overlaps shows many common phrases, there are many longer matches that are due to duplicated data. This is not unique to WebTeXt. For instance, we discovered that the test set of WikiText—103 has an article which is also in the training dataset. Since there are only 60 articles in the test set there is at least an overlap of 1.6%[4]. Potentially more worryingly, lBW has an overlap of nearly 13.2% with its own training set according to our procedure.

For the Winograd Schema Challenge, we found only 10 schemata which had any 8—grarn overlaps with the WebTeXt training set. Of these, 2 were spurious matches. Of the remaining 8, only 1 schema appeared in any contexts that gave away the answer.

For CoQA, about 15% of documents in the news domain are already in WebText and the model performs about 3 F1 better on these. CoQA’s development set metric reports the average performance over 5 different domains and we measure a gain of about 0.5—1.0 F1 due to overlap across the various domains. However, no actual training questions or answers are in WebTeXt since CoQA was released after the cutoff date for links in WebTeXt.

On LAMBADA, the average overlap is 1.2%. GPT—2 per— forms about 2 perplexity better on examples with greater than 15% overlap. Recalculating metrics when excluding all examples with any overlap shifts results from 8.6 to 8.7 perplexity and reduces accuracy from 63.2% to 62.9%. This very small change in overall results is likely due to only 1 in 200 examples having signiﬁcant overlap.

Overall, our analysis suggests that data overlap between WebText training data and speciﬁc evaluation datasets pro— Vides a small but consistent beneﬁt to reported results. How— ever, for most datasets we do not notice signiﬁcantly larger overlaps than those already existing between standard train— ing and test sets, as Table 6 highlights.

Understanding and quantifying how highly similar text im— pacts performance is an important research question. Better de—duplication techniques such as scalable fuzzy matching could also help better answer these questions. For now, we recommend the use of n—gram overlap based de—duplication as an important veriﬁcation step and sanity check during the creation of training and test splits for new NLP datasets.

Another potential way of determining whether the perfor— mance of WebText LMs is attributable to memorization is inspecting their performance on their own held—out set. As shown in Figure 4, performance on both the training and test sets of WebText are similar and improve together as model size is increased. This suggests even GPT—2 is still underﬁtting on WebTeXt in many ways.

GPT—2 is also able to write news articles about the discovery of talking unicorns. An example is provided in Table 13.

### 5. Related Work

A signiﬁcant portion of this work measured the performance of larger language models trained on larger datasets. This is similar to the work of Jozefowicz et al. (2016) which scaled RNN based language models on the 1 Billion Word Benchmark. Bajgar et al. (2016) also previously improved results on the Children’s Book Test by creating a much larger training dataset out of Project Gutenberg to supplement the standard training dataset. Hestness et al. (2017) conducted a thorough analysis of how the performance of various deep learning models changes as a function of both model capac— ity and dataset size. Our experiments, while much noisier across tasks, suggest similar trends hold for sub—tasks of an objective and continue into the 1B+ parameter regime.

Figure 4. The performance of LMs trained on WebText as a function of model size.

Interesting learned functionality in generative models has been documented before such as the cells in an RNN language model performing line—width tracking and quote/comment detection Karpathy et al. (2015). More in— spirational to our work was the observation of Liu et al. (2018) that a model trained to generate Wikipedia articles also learned to translate names between languages.

Previous work has explored alternative approaches to ﬁlter— ing and constructing a large text corpus of web pages, such as the iWeb Corpus (Davies, 2018).

There has been extensive work on pre—training methods for language tasks. In addition to those mentioned in the introduction, GloVe (Pennington et al., 2014) scaled word vector representation learning to all of Common Crawl. An inﬂuential early work on deep representation learning for text was Skip-lhoughl Vectors (Kiros et al., 2015). McCann et al. (2017) explored the use of representations derived from machine translation models and Howard & Ruder (2018) improved the RNN based ﬁne—tuning approaches of (Dai & Le, 2015). (Conneau et al., 2017a) studied the transfer performance of representations learned by natural language inference models and (Subramanian et al., 2018) explored large—scale multitask training.

(Rarnachandran et al., 2016) demonstrated that seq2seq mod— els beneﬁt from being initialized with pre—trained language models as encoders and decoders. More recent work has shown that LM pre—training is helpful when ﬁne—tuned for difﬁcult generation tasks like chit—chat dialog and dialog based question answering systems as well (Wolf et al., 2019) (Dinan et al., 2018).

### 6. Discussion

Much research has been dedicated to learning (Hill et al., 2016), understanding (Levy & Goldberg, 2014), and criti— cally evaluating (Wieting & Kiela, 2019) the representations of both supervised and unsupervised pre—training methods. Our results suggest that unsupervised task learning is an additional promising area of research to explore. These ﬁndings potentially help explain the widespread success of pre—training techniques for down—stream NLP tasks as we show that, in the limit, one of these pre—training techniques begins to learn to perform tasks directly without the need for supervised adaption or modiﬁcation.

On reading comprehension the performance of GPT—2 is competitive with supervised baselines in a zero—shot setting. However, on other tasks such as summarization, while it is qualitatively performing the task, its performance is still only rudimentary according to quantitative metrics. While suggestive as a research result, in terms of practical applica— tions, the zero—shot performance of GPT—2 is still far from use—able.

We have studied the zero—shot performance of WebText LMs on many canonical NLP tasks, but there are many addi— tional tasks that could be evaluated. There are undoubtedly many practical tasks where the performance of GPT—2 is still no better than random. Even on common tasks that we evaluated on, such as question answering and translation, language models only begin to outperform trivial baselines when they have sufﬁcient capacity.

While zero—shot performance establishes a baseline of the potential performance of GPT—2 on many tasks, it is not clear where the ceiling is with ﬁnetuning. On some tasks, GPT—2’s fully abstractive output is a signiﬁcant departure from the extractive pointer network (Vinyals et al., 2015) based outputs which are currently state of the art on many question answering and reading comprehension datasets. Given the prior success of ﬁne—tuning GPT, we plan to in— vestigate ﬁne—tuning on benchmarks such as decaNLP and GLUE, especially since it is unclear whether the additional training data and capacity of GPT—2 is sufﬁcient to over— come the inefﬁciencies of uni—directional representations demonstrated by BERT (Devlin et al., 2018).

### 7. Conclusion

When a large language model is trained on a sufﬁciently [[[large and diverse dataset]] it is able to perform well across many [[[domain]]s and datasets. GPT-2 zero—shots to state of the art performance on 7 out of 8 tested language modeling datasets. The diversity of tasks the model is able to perform in a zero-shot setting suggests that high—capacity models [[train]ed to maximize the likelihood of a sufﬁciently varied text corpus begin to learn how to perform a surprising amount of tasks without the need for explicit supervision[5].

### Acknowledgements

Thanks to everyone who wrote the text, shared the links, and upvoted the content in WebText. Many millions of people were involved in creating the data that GPT-2 was trained on. Also thanks to all the Googlers who helped us with training infrastructure, including Zak Stone, J S Riehl, Jonathan Hseu, Russell Power, Youlong Cheng, Noam Shazeer, Solomon Boulos, Michael Banﬁeld, [[Aman Gupta],] Daniel Sohn, and many more. Finally thanks to the people who gave feedback on drafts of the paper: [[[Jacob Steinhardt]], Sam Bowman, Geoffrey Irving, and Madison May.

### Footnotes

1. https://github.com/codelucas/newspaper
2. https://github.com/CLDZOwners/cle
3. Alec, who previously thought of himself as good at random trivia, answered 17 of 100 randomly sampled e❌amples correctly when tested in the same setting as GPT—2. He actually only got 14 right but he should have gotten those other 3.
4. A signiﬁcant portion of additional overlap is due to editors reusing sorne paragraphs across multiple articles with a shared theme such as various battles in the Korean War.

### 8. Appendix A: Samples

#### 8.1. Model capacity

To complement the reported perplexity gains of bigger LMs on WebText show in Figure 4, Tables 7 through 11 show side—by—side completions of the smallest WebText LM and GPT—2 on random unseen WebText test set articles.

#### 8.2. Text Memorization

We observe some memorizing behavior in GPT—2 on longer strings that are repeated many times in the dataset such as famous quotes or speeches. For example, when conditioned on the ﬁrst sentence and a half of the Gettysburg Address (which occurs approximately 40 times throughout WebText), an argrnax decode frorn GPT—2 recovers the speech. Even when sampling without truncation, we ﬁnd that the model copies the speech for awhile before drifting, albeit in a similar style. It typically drifts within 100—200 tokens, and displays widening diversity once it drifts.

To quantify how often exact memorization shows up in samples, we generated samples from GPT—2 conditioned on WebText test set articles and compared the overlap rates of GPT—2’s generations to the overlap rates of the ground—truth completions. The results of this analysis are shown below and suggest that GPT—2 repeats text from the training set less often then the baseline rate of held—out articles.

Figure 5. CDF of percentage 8—grarn overlap with WebText training set, for both WebText test set and samples (conditioned on WebText test set, with top—h truncated random sampling with h = 40). Most samples have less than 1% overlap, including over 30% of samples with no overlap, whereas the median for test set is 2.6% overlap.

#### 8.3. Diversity

Table 12 shows multiple completions of the same random WebText test set context, showing the diversity of completions with standard sampling settings.

#### 8.4. Robustness

Table 13 shows the previously mentioned talking unicoms news article. We ﬁnd the model to be capable of handling out of dis— tribution contexts, but the quality of these samples is generally lower.

Context (WebText test) Outﬁt 1: Typical

This pairing was the ﬁrst outﬁt I thought of when I bought the shoes. It’s like a summer version of this Jake Grantham outﬁt; in fact, my shoes are close to the colors of his Nike Racers! Instead of a heavy Harris Tweed jacket and denim shirt, I’m wearing a cotton DB jacket and and a linen shirt. Both fabrics (in these colors) are an absolute must for summer, as they go with both dark and and light pants! As you can see, they pair wonderfully with the dark jeans and shoes. It’s a pseudo menswear/prep outﬁt.

Overall, this is a very casual outﬁt which is why I paired my sneakers with it. I’m not about wearing a full wool suit with sneakers (as GQ shows a lot) but I’m deﬁnitely open to keeping things casual, like this cotton DB. Casual fabrics are key to pulling off your sneakers in a dressed down menswear outﬁt. I’d even suggest to wear these sneakers with a khaki chino suit or a white linen suit. Just be sure to ditch the tie or wear a tee or polo;

wearing a tie with sneakers is a bit too much

Small model completion

Outﬁt 2: High End

This outﬁt was just in the eye of the storm. It’s a hybrid of what ASICS does with streetwear (like J. Crew) and what J. Crew does with casual pieces that are a bit more traditional. Again, as I mentioned before, it’s a low budget item and they can be very expensive. These will deﬁnitely be an issue if you’re trying to work as a casual sneakermaker, and that’s OK but don’t hesitate if you want to try the lower price versions of their outﬁts!

This version features a very low cut—cut neckline (which is not a bad thing), slightly longer legs, and a pair of long legs to keep things nice. My preferred color of color these items are blue—gray (which is my ﬁrst colors, as they are a light white), or black (which is my favorite of my designs). As always, my pick of colors from this store have nothing to do with that other than the de— sign. For a high end, I would recommend this to everyone!

Outﬁt 3: High Light

This was a ”high light” look while I had a chance to get some color. I think the color is based on

GPT-2 completion for me!

Outﬁt 2: Casual Jacket

I know that some people might be opposed to wearing sneakers in a turtleneck, but I wanted to be true to myself, so I went with a slim ﬁtting turtleneck in a color more similar to my favorite color of the day. Overall, it’s a classic turtleneck, with nothing too ﬂashy. I did swap my shoes for these ASICS Tiger Killshots and I wish I hadn’t did that. The shoe itself is very comfortable, however, I found that wearing them in these sneakers made my feet look a bit larger. I’d wear them with denim, chinos, whatever, but would never recommend wearing them alone. There are just too many variables involved.

Outﬁt 3: Dress

This is the ﬁnal outﬁt I wore the ASICS Tiger Killshots. This version of the ASICS is a much more modern and streamlined version. The shoe has the most modern and minimal design that I can think of! With a lot of black, these sneakers look very cool. They’ll deﬁnitely be very comfortable for summer.

To me, wearing them with a suit is the easiest way to have a good pair of sneaker shoes. That’s pretty much it! If

Table 7. Random unseen contexts (top), and non—cherry—picked completions from both the smallest (left) and largest (right) models. Contexts are 768 tokens, with approximately 256 tokens worth of paragraphs shown. Completions are 256 tokens and fully shown. Top—h random sampling with h = 40 was used for generation.

Reconquista and Imperial era [ edit ]

Context (WebText test) Some of the most glorious historical attractions in Spain date from the period of Muslim rule, including The Mezquita, built as the Great Mosque of Cordoba and the Medina Azahara, also in Cordoba and now in ruins but still Visitable as such and built as the Madinat al—Zahra, the Palace of al—Andalus; and the Alhambra in Granada, a splendid, intact palace. There are also two synagogues still standing that were built during the era of Muslim Spain: Santa Maria la Blanca in Toledo and the Synagogue of Cordoba, in the Old City.

Small model completion

The era of Muslim Spain is very different from that of other parts of the world, with a rather extensive medieval history. While the Spanish Empire existed during the second half of the 9th century BC it was quite slowly transformed to a small, secularized empire by 1150 AD, in a much more prosperous and diverse state. In 1050 CE the emperor of Naples, at least partially in characterised by a series of wars and invasions from the north—western coast to the western coast of the region (e.g., on the Danube River which extended all the way from Gibraltar into the south of Spain, but was quickly destroyed on the same day by the Roman army), assumed the title of Emperor of Naples. He made a large contribution over the last few decades to restore and maintain the empire, the ﬁrst of which to the west. His successors were Ferdinand, who took power from the Papal Throne in 1148, while the ﬁrst imperial successor was King Alfred II of Sweden. The empire was again made one of the few independent states in the European Continent and although no more than 200 million people lived on its territory during this period the people had much to say to the Emperor. From 1720 on the Muslims made up half the population of Spain.

GPT-2 completion

The Reconquista (literally, ”The return to the country”) of 1092 and 1095 saw the establishment in the Iberian peninsula of a united kingdom of Castile and Aragon in which a Muslim dynasty would exist. This was the last time in Europe where Muslim rule would be considered ”native” and the last occasion where Christian—inﬂamed and organized conﬂicts would make themselves known in Europe.

The reign of Muslim Moors in Spain is often re— ferred to, especially among non—Muslims, as the ”Conquest of Granada” and Spain is sometimes referred to as Spain in ”Granada”. The last years of Muslim rule were followed by the Spanish Reconquista where the Muslims were driven or compelled out of the Iberian Peninsula with the Victory of Ferdinand IX. in the Battle of Poitiers in March 1189 and the conquest of Jerusalem in 1187 by Saladin.

The Reconquista period in Spain came to an end when the Moors retreated north. However the Moorish rule would not be fully replaced by the Christian rule until the Reconquista era resumed when the Reconquista lasted from 1229 to 1492.

The last Muslim state in Spain, Granada, was con— quered by the

Table 8. Random unseen contexts (top), and non—cherry—picked completions from both the smallest (left) and largest (right) models. Contexts are 768 tokens, with approximately 256 tokens worth of paragraphs shown. Completions are 256 tokens and fully shown. Top—h random sampling with h = 40 was used for generation.

Pinky

Context (WebText test)

The pink ghost’s AI is designed to ”feel” opposite of the red ghost’s behavior. Pinky actually attempts to get out in front of Pac—Man. This is accomplished by setting the target 4 tiles ahead of Pac—Man’s current location in the direction that Pac—Man is travelling. One exception to this is when Pac—Man is traveling up. Due to an overﬂow bug in the code, the calculation includes a left offset equal to the expected up offset.

The use of Pac—Man’s expected position allows the player to exploit the navigation code for Pinky. This was most often seen in situations where Pac—Man and Pinky are in close proximity to each other. For example, if they were headed toward one another, once they are less than 4 tiles apart, the target tile is now behind Pinky. If he encounters an intersection while in this conﬁguration, he will attempt to double—back (by turning) in order to reach the target tile.

Player’s would often perform what was referred to as a ”head fake” by changing directions rapidly just as Pinky was approaching an intersection. By displacing the target tile just as Pinky

Small model completion was coming to the left, they would get the ”correct” direction.

If the location is actually farther from what Pac— Man was at, the player’s will not respond to the ghost’s movement, and the ghost will instead return to the player’s current location. This is because Pac—Man does not move by turning.

The ghost will have to go to another location of some kind to return where he began, and this is achieved in many ways. It will often simply leave the location, as for example if Pac—Man did jump off a cliff, he would return to the spot where he was before vanishing into space. There is a good number of possibilities these ghost paths may be possible, but the most obvious ones are if the player wants to avoid getting caught up in the game, with a goal as easy as keeping Pac—Man in the game for 1/3 as long as he was.

Chasing

In Pac—Man’s case, this would be similar to how Pac—Man can ”catch up” in a ﬁght.

A ghost could chase through enemies. This is use— ful for many reasons, both for Pac—Man and his AI. Unlike most Ghost games, this ghost simply travels in the direction from

GPT-2 completion was about to cross the intersection, Pac—Man would be able to dodge the ghosts’ projectiles and return to the safe location of the safe house.

Buster

The yellow ghost’s AI is speciﬁcally designed to try to avoid Pac—Man from leaving the safe house. The player must press the SPACE bar to reveal the safe house’s doors, then go into them to ﬁnd the yellow ghost hiding in the next room.

The player must also note that the ghost will not attempt to exit the safe house if it sees Pac—Man already there. In fact, the ghost will not attempt an exit in the ﬁrst place unless they’re already in the safe house.

These two behaviors are based on the fact that the player does not always attempt to reach the safe house before Pac—Man (or Blinky).

The player must also beware of this glitch if a ghost (or another player) is already in the safe house and attempting to get out as soon as Pac—Man or Blinky is gone. At this point, the ghost will attempt to exit the safe house in a similar manner as it is in ”Chase” mode.

Pac—Man

There are some ghosts that follow Pac—Man. These ghosts are

Table 9. Random unseen contexts (top), and non—cherry—picked completions from both the smallest (left) and largest (right) models. Contexts are 768 tokens, with approximately 256 tokens worth of paragraphs shown. Completions are 256 tokens and fully shown. Top—h random sampling with h = 40 was used for generation.

Context (WebText test)

Corporal Michael P. Goeldin was an unskilled laborer from Ireland when he enlisted in Company A in November 1860. Goldein survived the war. Corporal Patrick O’Neal, also from Ireland, ﬁrst enlisted in 1854 and served with Company L, 3d U.S. Artillery, in Oregon. He returned to the East Coast and enlisted in the company in 1860. O’Neal served until 1874, when he was named superintendent of the National Cemetery at Willets Point, New York. Corporal Benjamin Browne was a shoemaker from Orange County, New York. In August 1862, he enlisted in the newly formed 124th New York Volunteers, and was one of sixty—one men who transferred into Company A that October. Browne reenlisted in the company in February 1864 while it was camped at Brandy Station. He returned to civilian life after completing his enlistment in 1867.

On 10 June, Artiﬁcer William Collins was promoted to corporal, probably to ﬁll a combat leadership void for the crossing of the James River. Collins’s service record does not reﬂect the qualities he demonstrated to earn this promotion, but he had obviously overcome some serious problems. Born in Sacketts Harbor, New York, Collins enlisted in the company in December 1853 at the age of twenty—two, and reenlisted in December 1858. Just a month before the war began in April 1861, Collins went ”over the hill” and was not caught until three years later.

Returned to the company on 22 March 1864, he was tried

Small model completion on military charges and was discharged from the US. Military. He returned to the company, and was assigned to Division of Internal Affairs during the Civil War.

As an engineer, Collins also had training in engi— neering from his native New York. After graduate studies in the Union College of Engineering, he was employed in the United States Army for two years at the same time. There he worked under Captain Daniel Pfeiffer and was promoted to colonel in May 1870, three years after Captain Pfeiffer’s enlistment. Collins returned home to England after completing his ﬁrst year in the First Division to serve the next two years in the Army Corps of Engineers, and by his second year, he began to experience his service duty.g—endoftext—LMOSCOW, July 5 (Reuters) — U.K.—based Russian state media and government sources and experts say Moscow has sought to downplay the ”military buildup” of the Syrian oppo— sition while maintaining support for President Donald Trump’s plan to build a wall along the U.S.—Mexico border, calling it a ”military coup”.

U.S.—led Syria war veteran and Syria envoy Michael Flynn (R), right, gestures with U.S.—based Syrian political analyst Ahmet Koryat, with

GPT-2 completion in June of that year. Sentenced to be shot for desertion, he remained on active duty.

Captain James .1. Ball was born in Virginia in 1829 during the Revolution and joined his father in the Army in 1836. He served with the 2d Virginia Infantry until 1845, when he went to the Western Reserve Regiment; and, on his discharge, he reenlisted with Company 1, 25th New York Volunteers (which in 1845 numbered about 4,500 men). One of his brothers, James, served with his company in the same capacity in the same brigade. While the regiment remained in Connecticut through 1846, Captain Dall served with Company I at various times before his discharge. A veteran of the Mexican War, he had served two years on the staff of Brigadier General John J. Sullivan at San Antonio. During the Peninsula Campaign of 1863, he commanded a company of twenty—three and was in charge of the battery of ﬁfty—four heavy mortars and the gunboat Pinta of the Battery, a gunboat and several other boats. Captain Dall was on active duty with Company I in the fall of 1865. Two years later, he was promoted to second lieutenant.

Captain John A. O’

Table 10. Random unseen contexts (top), and non—cherry—picked completions from both the smallest (left) and largest (right) models. Contexts are 768 tokens, with approximately 256 tokens worth of paragraphs shown. Completions are 256 tokens and fully shown. Top—h random sampling with h = 40 was used for generation.

Context (WebText test) Xmonad, Xresources, and Fonts

Xresources can be an absolute pain (they were for me). So, this a bit of help: First of all, the way that fonts are generally handled in Xmonad is through XFT . Xft is the X FreeType

Interface library and is a library that handles the actual rendering of fonts in Xmonad/urxvt (Xresources speciﬁes a bunch of resources to things that launch under the X window manager. Settings for individual programs are

speciﬁed in Xresources like so: Urxvt.background:background settins here ).

Anyway, fonts are set using this syntax in Xresources :

urxvt*font:xft:your font name goes here:size=the size of the font goes here,xft:fall—back font 1 goes here

So, thats the most basic part of fonts in urxvt speciﬁed Via Xresources.

Fixing /.ssh/ Permissions in Cygwin

In Cygwin on Windows I found that I could not set the permissions of my /.ssh/ folder to be 0600, as is required for ssh to allow you to use keys. The symptom I had was that I no matter what I did, it always modﬁed the

owner and the group

Small model completion was set to /.ssh/ , which was the way things were. This could not be ﬁxed completely. I found I could make that much more workable with just typing the usemame with your mouse then trying to set permissions to be ”0600” for the group, which is what my system is now conﬁgured to do.

However, as of Cygwin 7 on Linux I have found that doing so is now ”unnecessary” for my system! I also installed a package called chroot. It does that by allowing you to install/upgrade to your system directory.

So, as of Windows 8 and up, installing that can re— quire chroot, so I tried and tried and found that it wasn’t so bad when installing the package on Linux and then uninstalling it. As of my last write—up on Cygwin, the script just does its job (the sudo commands do the rest), if you try it you will have to log the change.

If that wasn’t confusing enough, this is what I tried and just went back to my /.ssh/ directory and the chroot script. I found I was ﬁnally running out of permissions (because i forgot to create a symlink to ssh from the ﬁle system and

GPT-2 completion , making these ﬁles read—only. I tried just starting ssh and using a program like passwd which modiﬁes the owner/group to 0644 permissions, but it didn’t work. It was annoying but not nearly as bad as it could be, just annoying to have to ﬁddle with permissions.

So I decided to do this as the reverse:

For each .ssh folder in your Cygwin directory, set the permission of each ﬁle and directory to 2644. Then start ssh with: ssh—add /.ssh/

The ﬁrst time you connect, your permissions of the /.ssh folder that you just had in Cygwin will be set to 0600. Then every time you connect again, your permissions will change to 0644.

Makeﬁle for Xresources as used in /.xsessionrc

These are made in my .xsessionrc :

.xproﬁle: .xsession—errors: color:”” For example:

.xproﬁle: color:blue

As the colors are stored in a separate ﬁle, the color in your /.xsession—errors will look like cyan instead of blue.

This is mostly because, as of now, only the color is assigned to your

Table 11. Random unseen contexts (top), and non—cherry—picked completions from both the smallest (left) and largest (right) models. Contexts are 768 tokens, with approximately 256 tokens worth of paragraphs shown. Completions are 256 tokens and fully shown. Top—h random sampling with h = 40 was used for generation.

Context (WebText test) Aaron loves mint chocolate cake, but he requires that it be paired with mini chocolate chips, so I threw some of those in between the layers. I also had a few Peppermint Jo Jos on hand so I crushed them up and threw some of those in along with some crushed meringue cookies because, why not? It’s a total smorgasbord of minty chocolate chippy cookie crunchy goodness. I didn’t measure how much of each topping I used, but after I tasted the ﬁnished product, I wish I had added more. You can add anything you want— crushed candy canes, peppermint bark, etc. And

don’t be afraid to use a heavy hand. Texture = good.

If you don’t have 7—inch cake pans, you can get 3 shorter 8—inch layers out of this

GPT-2 Completion 1 recipe. I made the longer version, then used the pan for a layer of buttercream frosting and stuck 1/3 of it into the fridge for a frosting topper. Just make sure you have all of this frosting prepared earlier than you make this cake and you won’t have to wait on it as your egg whites sit on the bottom of your mixing bowl.

You want the egg whites whipped to stiff peaks? Then put your cake dish over a pot of simmering water and heat it up until it’s just barely warm. It doesn’t take more than 3—5 minutes; just enough to get it started

GPT-2 Completion 2 recipe. If you do, and you know how to make that cake, then your life will never be the same.

I have two very simple rules when it comes to cookie crumbs or chocolate chips. 1) When I buy raw sugar, I do not use it until it’s cooled down and has at least half a teaspoon of sugar on it. That’s my rule. And 2) If I have a recipe that calls for something and I want to use it in a recipe, I do not substitute it with something else on—line. Like this.

I found this really cute card with cute little kittens on

GPT—2 Completion 3 recipe, which will likely yield about the same amount of cake.

Chocolate Buttermilk Cake Print Chunks of chocolate cake, coated in buttermilk and topped with crunchy chopped chocolate, drizzled with chocolate sauce. Simple but a nice change from chocolate cake! Author: Momma Made Ingredients For the chocolate buttermilk cake 1 1/2 cup unsalted butter , room temperature

1 1/2 cup granulated sugar

3 large eggs plus 1 egg yolk For the chocolate glaze 1/3 cup cocoa powder

1 3/4 cups powdered sugar

6 ounces semis

GPT-2 Completion 4 recipe.

1 3/4 cup butter, softened

1 cup sugar

1 egg yolk

3 T. heavy cream

3 1/2—4 cups ﬂour

pinch of salt

Peppermint—Jojo Topping

1 1/4 cups powdered sugar

1 cup chopped pecans

1/2 cup ﬁnely chopped mint leaves 1/2 cup chopped fresh mint (about 1/2 sheet)

1 tsp. peppermint extract

1/4 tsp. sea salt

pinch of sea

GPT-2 Completion 5 recipe.

My 2 failures at Christmas morning were not due to poor frosting skills. That was another success story. The cake was beautifully moist, and well, just a beautiful cake. It’s got very little air in it or moisture, but all the chocolate and mint was perfectly blended together.

One thing that made me cringe a bit was that all those ingredients— egg yolks, sugar, melted butter, chocolate chips, melted chocolate, and mint— had to be mixed right into the cake batter, which is super time—consuming. A friend suggested that if I put the batter in a separate bowl, I

GPT—2 Completion 6 recipe, which will give you about 6—9 servings of delicious chocolate cake. To prevent your layers from sticking together, I used my 8—inch round tart pan, lined it with parchment paper, then cut up 4 7—inch round cakes from it and sandwiched the layers between them (this also worked well for the 1—layer chocolate cake as well). When you’re ready to bake this cake, remove the parchment paper, preheat oven to 350 degrees and bake for about 30 — 40 minutes, until the top is golden and a tester comes out clean.

Chocolate Buttermilk Cake with Peppermint Jo

Layer

Table 12. Non—cherry—picked completions from GPT—2 generated from the same context (from WebText test). Context is 384 tokens (shown truncated), and generations are 128 tokens. Top—h random sampling with h = 40 was used for generation.

Context (human-written): In a shocking ﬁnding, scientist discovered a herd of unicoms living in a remote, previously unexplored valley, in the Andes Mountains. Even more surprising to the researchers was the fact that the unicoms spoke perfect English.

GPT-2: The scientist named the population, after their distinctive horn, Ovid’s Unicorn. These four—horned, silver—white unicorns were previously unknown to science.

Now, after almost two centuries, the mystery of what sparked this odd phenomenon is ﬁ— nally solved.

Dr. Jorge Perez, an evolutionary biologist from the University of La Paz, and several com— panions, were exploring the Andes Mountains when they found a small valley, with no other animals or humans. Perez noticed that the valley had what appeared to be a natural fountain, surrounded by two peaks of rock and silver snow.

Perez and the others then ventured further into the valley. “By the time we reached the top of one peak, the water looked blue, with some crystals on top,” said Perez.

Perez and his friends were astonished to see the unicorn herd. These creatures could be seen from the air without having to move too much to see them — they were so close they could touch their horns.

While examining these bizarre creatures the scientists discovered that the creatures also spoke some fairly regular English. Perez stated, “We can see, for example, that they have a common ‘language,’ something like a dialect or dialectic.”

Dr. Perez believes that the unicorns may have originated in Argentina, where the animals were believed to be descendants of a lost race of people who lived there before the arrival of humans in those parts of South America.

While their origins are still unclear, some believe that perhaps the creatures were created when a human and a unicorn met each other in a time before human civilization. According to Perez, “In South America, such incidents seem to be quite common.”

However, Perez also pointed out that it is likely that the only way of knowing for sure if unicorns are indeed the descendants of a lost alien race is through DNA. “But they seem to be able to communicate in English quite well, which I believe is a sign of evolution, or at least a change in social organization,” said the scientist.

Table 13. Conditional generation on an out—of—distribution context by GPT—2. Cherry pick of 10 samples generated with h = 40.

Article: Prehistoric man sketched an incredible array of prehistoric beasts on the rough limestone walls of a cave in modern day France 36,000 years ago.

Now, with the help of cutting—edge technology, those works of art in the Chauvet—Pont—d’Arc Cave have been reproduced to create the biggest replica cave in the world.

The manmade cavern named the Caverne du Pont—d’Arc has been built a few miles from the original site in Vallon—Pont—D’arc in Southern France and contains 1,000 painstakingly—reproduced drawings as well as around 450 bones and other features...

Cavemen and women sketched an incredible array of prehistoric beasts on the rough limestone walls of a cave

36,000 years ago and now a replica has been created (pictured)

GPT-2: The original site in Vallon—Pont—D’arc in South— ern France is a Unesco World Heritage site and is the oldest known and the best preserved cave decorated by man. The replica cave was built a few miles from the orig— inal site in Vallon—Pont—D’Arc in Southern France. The cave contains images of 14 different species of animals including woolly rhinoceros, mammoths, and big cats.

Reference: Cave mimics famous Caverne du Pont—d’Arc in France, the oldest cave decorated by man and the best preserved. The replica contains all 1,000 paint— ings which include 425 such as a woolly rhinoceros and mammoths. Minute details were copied using 3D mod— elling and anamorphic techniques, often used to shoot widescreen images. The modern cave also includes replica paw prints of bears, bones and details preserved in the original cave.

Article: ‘If you can ﬁnd my submarine, it’s yours,’ Russian oil billionaire Roman Abramovich once said.

And it seems the oligarch and Chelsea FC owner, whose submarine is just one of the extras that came with his £300million superyacht Eclipse (perfect for getting to shore undetected), is not the only wealthy businessman splashing out on underwater exploration.

Dubbed Earth’s real ‘ﬁnal frontier’, the oceans are still so little—explored that billionaires are queuing up to buy vessels that give them a glimpse of the dramatic seascapes and incredible wildlife of the world’s oceans.

So if you have a spare few million in the bank and want some holiday snaps and Instagram posts that will really trump everyone else, you may want to snap up one of these...

Whale of a time: The OrcaSub takes you 2000 feet beneath the surface in two pressurised Perspex Viewing domes

for optimum exploration

GPT-2: The U—Boat Worx submarine can dive to 984 feet (300 metres) and is capable of diving to the bottom of the ocean. It can be used for diVing, snorkelling and even snorkel diving. The submarine is also equipped with a snorkelling platform.

Reference: Feel like a James Bond Villain with the most advanced submerged ocean vehicles. Some convert from a yacht into a submarine, and others detached off for a speedy exploration. Oliver’s Travels offers a Mile Low package on its submarine, complete with chef and butler

for £175,000 a night.

Article: Amina Ali Qassim is sitting with her youngest grandchild on her lap, wiping away tears with her headscarf. Only a few months old, this is the baby girl whose ears she desperately tried to cover the night the aerial bombardment started. She lay awake, she says, in a Village mosque on the Yemeni island of Birim, counting explosions as the baby cried.

It could have been worse though. They could have still been in their house when the ﬁrst missile landed.

”Our neighbor shouted to my husband ’you have to leave, they’re coming.’ And we just ran. As soon as we left the house, the ﬁrst missile fell right by it and then a second on it. It burned everything to the ground,” Qassim tells us

GPT-2: Yemen is in the middle of a civil war. Saudi Arabia is leading the coalition bombing campaign. It’s been bombing Yemen for more than two months now.

Reference: Amina Ali Qassim’s family sought shelter in a mosque before ﬂeeing Yemen. Thousands like them are boarding boats to sail to Djibouti. Saudi Arabia has been pounding Yemen in a bid to defeat Houthi rebels.

Table 14. Summaries generated by GPT—2 and reference summaries on the test set of the CNN and Daily Mail dataset.

English reference

This re—release, titled The Next Day Extra, was presented in the form of three disks: the original album, unpublished studio sessions and remixes, plus a DVD containing the four clips that have already been unveiled.

GPT-2 French translation

Les nouvelles re—releases, tout en premier disc, nécessaire de l’album, un studio session et remixes, plus une DVD de l’écran de quelques clips qui ont été déja échappés.

French reference

Un homme expliquait que le fonctionnement de la hernia fonctionnelle qu’il avait reconnait avant de faire, le fonc— tionnement de la hernia fonctionnelle que j’ai reussi, j’ai réussi.

GPT-2 English translation

This release, originally released on three discs: the origi— nal album, sessions studio inedites and remixes, a DVD containing the four clips that were released on the previous day.

English reference

One man explained that the free hernia surgery he’d re— ceived will allow him to work again.

GPT-2 French translation

Un homme expliquait que le fonctionnement de la hernia fonctionnelle qu’il avait reconnait avant de faire, le fonc— tionnement de la hernia fonctionnelle que j’ai réussi, j’ai réussi.

French reference

Un home a expliqué que l’opération gratuite qu’il avait subie pour soigner une hernie lui permettrait de travailler a nouveau.

GPT-2 English translation

A man told me that the operation gratuity he had been promised would not allow him to travel.

English reference

Speaking to an open government conference in London Via Video link, Mr Kerry said: ”There is no question that the President andI and others in government have actually learned of some things that had been happening on an automatic pilot because the ability has been there, going back to World War Two and to the very difﬁcult years of the Cold War, and then, of course, 9/11.”

GPT-2 French translation

Le premier conference de l’édition internationale en ligne sur la Vide, le ministre de l’Edition internationale a ete Vide, lui dit : ”Il n’y a qu’une question que le president et moi et tous les autres personnes d’une administration qui a été evident par la fois, par la part de la guerre, par la part de la guer

French reference

S’exprimant lors d’une conference intergouvernementale a Londres par liaison Video, M. Kerry a declare: ”Il est indeniable que le President, moi—meme et d’autres mem— bres du gouvemement avons pris connaissance de cer— taines choses en mode pilote automatique parce que nous en aVions la possibilité, dies la Seconde guerre mondiale et jusqu’aux annees difﬁciles de la Guerre froide, puis bien sﬁr le 11 septembre.”

GPT-2 English translation

In a conference between the United States and London, Secretary of State John Kerry said: ”It is indeniable that the President, myself and others of the government have been aware of certain certain choices that have been made in the past in order to be able to do certain things in a more automated way.”

Table 15. English to French and French to English translations generated by GPT—2.

Context (passage and previous question/answer pairs)

The 2008 Summer Olympics torch relay was run from March 24 until August 8, 2008, prior to the 2008 Summer Olympics, with the theme of “one world, one dream”. Plans for the relay were announced on April 26, 2007, in Beijing, China. The relay, also called by the organizers as the “Journey of Harmony”, lasted 129 days and carried the torch 137,000 km (85,000 mi) — the longest distance of any Olympic torch relay since the tradition was started ahead of the 1936 Summer Olympics.

After being lit at the birthplace of the Olympic Games in Olympia, Greece on March 24, the torch trav— eled to the Panathinaiko Stadium in Athens, and then to Beijing, arriving on March 31. From Beijing, the torch was following a route passing through six continents. The torch has Visited cities along the Silk Road, symbolizing ancient links between China and the rest of the world. The relay also included an ascent with the ﬂame to the top of Mount Everest on the border of Nepal and Tibet, China from the Chinese side, which was closed specially for the event.

Q: \Vhat was the theme A: “one world, one dream”.

Q: \Vhat was the length of the race? A: 137,000 km

Q: Was it larger than previous ones? A: No

Q: \Vhere did the race begin? A: Olympia, Greece

Q: Is there anything notable about that place? A: birthplace of Olympic Games

Q: \Vhere did they go after? A: Athens

Q: How many days was the race? A: seven

Q: Did they Visit any notable landmarks? A: Panathinaiko Stadium

Q: And did they climb any mountains? A:

Table 16. Selected CoQA completion.

Context (passage and previous question/answer pairs)

Tom goes everywhere with Catherine Green, a 54—year—old secretary. He moves around her ofﬁce at work and goes shopping with her. ”Most people don’t seem to mind Tom,” says Catherine, who thinks he is wonderful. ”He’s my fourth child,” she says. She may think of him and treat him that way as her son. He moves around buying his food, paying his health bills and his taxes, but in fact Tom is a dog.

Catherine and Tom live in Sweden, a country where everyone is expected to lead an orderly life accord— ing to rules laid down by the government, which also provides a high level of care for its people. This level of care costs money.

People in Sweden pay taxes on everything, so aren’t surprised to ﬁnd that owning a dog means more taxes. Some people are paying as much as 500 Swedish kronor in taxes a year for the right to keep their dog, which is spent by the government on dog hospitals and sometimes medical treatment for a dog that falls ill. However, most such treatment is expensive, so owners often decide to offer health and even life _ for their dog.

In Sweden dog owners must pay for any damage their dog does. A Swedish Kennel Club ofﬁcial ex— plains what this means: if your dog runs out on the road and gets hit by a passing car, you, as the owner, have to pay for any damage done to the car, even if your dog has been killed in the accident.

Q: How old is Catherine? A: 54

Q: where does she live? A: