Trending questions in Edureka Community

0 votes
0 answers

What are cold storage and hot storage in cloud computing?

I’m trying to understand the difference between ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
858 views
0 votes
0 answers

How do you optimize federated averaging (FedAvg) for personalized AI models?

With the help of proper code example ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,370 points
684 views
0 votes
0 answers

How does AWS handle disaster recovery?

AWS provides multiple options for data backup ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,970 points
1,541 views
0 votes
0 answers

How do you use torch.fx graph transformations for optimized AI model execution?

May i know How do you use ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,370 points
675 views
0 votes
0 answers

How does cloud-based encryption work for data at rest?

When cloud providers say data is encrypted ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
825 views
0 votes
1 answer

Can I reuse my Power BI semantic model (dataset) in Paginated Reports?

It is possible to reuse your Power ...READ MORE

Jun 11, 2025 in Power BI by anonymous
• 36,180 points
1,119 views
0 votes
0 answers

What is a cloud marketplace, and how does it facilitate app development?

I’ve noticed most cloud providers have something ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,970 points
814 views
0 votes
0 answers

How to Implement A3C (Asynchronous Advantage Actor-Critic) for large-scale AI models.

Can i know How to Implement A3C ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
847 views
0 votes
0 answers

How do you design cloud systems for low-latency applications?

I'm building a cloud-based system where low ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,970 points
796 views
0 votes
0 answers

What is the AWS shared responsibility model?

AWS and customers share security responsibilities. What ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,970 points
1,485 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
1,033 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
1,022 views
0 votes
0 answers

how to implement document OCR + LLM pipeline for structured data extraction.

With the help of code let me ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,370 points
841 views
0 votes
1 answer

How can I dynamically filter Top N customers based on sales in the most recent fiscal quarter using a time slicer?

To dynamically filter Top N customers based ...READ MORE

Jun 19, 2025 in Power BI by anonymous
• 36,180 points
691 views
0 votes
0 answers

How do you perform automated backups in cloud environments?

I want to set up automated backups ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,970 points
735 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
979 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

Jun 16, 2025 in Cloud Computing by Anupam
• 18,970 points
857 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
974 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
960 views
0 votes
1 answer

How to turn off the camera light on a laptop?

Here are general steps and specific instructions ...READ MORE

Nov 28, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
9,439 views
0 votes
0 answers

How to implement natural language to SQL translation using an LLM.

Can i know How to implement natural ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,370 points
789 views
0 votes
0 answers

How do you fine-tune a code model for a specific programming language?

Can you tell me with the help ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,370 points
789 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
948 views
0 votes
0 answers

How do you use soft actor-critic (SAC) to optimize AI-generated responses?

Could you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
742 views
0 votes
1 answer

Is there a way to programmatically extract a table from a Power BI dashboard when the “Export data” option is disabled?

When "Export Data" is turned off, the ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
730 views
0 votes
0 answers

How to implement zero-day attack detection using AI-based behavioral analysis.

Can i know How to implement zero-day ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
739 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
940 views
0 votes
1 answer

What is TCP window size scanning, and how does it detect OS?

TCP Window Size Scanning is a technique ...READ MORE

May 2, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,722 views
0 votes
0 answers

How do you apply projected gradient descent (PGD) to attack AI text models?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
712 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
916 views
0 votes
0 answers

how to Implement GLU (Gated Linear Units) to replace feedforward layers in transformers.

May i know how to Implement GLU ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
710 views
0 votes
0 answers

How to Implement adversarial training using fast gradient sign method (FGSM).

Can you tell me with the help ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
704 views
0 votes
1 answer

How to handle column type inconsistencies in Power BI transformations?

In Power BI, managing column-type inconsistencies is ...READ MORE

Jun 10, 2025 in Power BI by anonymous
• 36,180 points
1,006 views
0 votes
0 answers

How do you implement geo-redundant cloud applications?

Geo-redundancy ensures high availability by distributing applications ...READ MORE

Jun 17, 2025 in Cloud Computing by Anupam
• 18,970 points
738 views
0 votes
0 answers

How do you optimize NCCL communication for multi-GPU transformer models?

Can you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
694 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

Jun 13, 2025 in Power BI by anonymous
• 36,180 points
866 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points

closed Jun 13, 2025 by Anupam 899 views
0 votes
1 answer

Why does a seemingly small Power BI query consume several gigabytes of memory?

Numerous performance-affecting factors can lead to high ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
680 views
0 votes
0 answers

What is strong consistency, and when do you need it in the cloud?

I’m trying to understand when strong consistency ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
647 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
894 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
892 views
0 votes
0 answers

How to implement custom CUDA kernels for transformer acceleration.

Can i know How to implement custom ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,370 points
706 views
0 votes
0 answers

How do you apply ZeRO stage 3 optimizations for memory-efficient training?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
671 views
0 votes
0 answers

How to implement Monte Carlo Tree Search (MCTS) in generative AI-driven games.

Can i know How to implement Monte ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,370 points
453 views
0 votes
1 answer

How to dynamically display assignees based on hierarchy drill levels in a Power BI matrix (e.g., using Jira data)?

If the user has drilled down to ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
659 views
0 votes
0 answers

How to implement Q-learning to optimize chatbot response strategies.

Can i know How to implement Q-learning ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
664 views
0 votes
0 answers

How to implement failover mechanisms for LLM inference failures.

With the help of code can you ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,370 points
691 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

Jun 12, 2025 in SalesForce by Ashutosh
• 33,370 points
904 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
854 views
0 votes
0 answers

How do you use triton kernels to accelerate transformer block computations?

With the help of code can i ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,370 points
646 views