Latest questions in Edureka Community

0 votes
1 answer

How to Implement a Hybrid Search RAG Pipeline using FAISS and BM25.

You can implement a Hybrid Search RAG ...READ MORE

May 5 in Generative AI by somaya
334 views
0 votes
1 answer

How to develop a Style Injection Model using diffusion-based latent encoding.

You can develop a Style Injection Model ...READ MORE

May 5 in Generative AI by minato
143 views
0 votes
1 answer

How to Implement a Zero Redundancy Optimizer (ZeRO) for large model training.

You can implement a Zero Redundancy Optimizer ...READ MORE

May 5 in Generative AI by mino
185 views
0 votes
0 answers

How to Modify an LLM’s Feedforward Layer (FFN) for sparsity-aware computation.

May i know How to Modify an ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
114 views
0 votes
0 answers

How to implement Grouped Query Attention (GQA) for optimizing LLM inference.

Can i know How to implement Grouped ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
104 views
0 votes
0 answers

How to implement relative positional embeddings for an LLM using torch.nn.

With the help of code can i ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
108 views
0 votes
0 answers

How to modify a Transformer Decoder to support dynamic memory augmentation.

Can you tell me How to modify ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
124 views
0 votes
1 answer

How to implement a Byte-Level Tokenizer from scratch using sentencepiece for an LLM.

You can implement a Byte-Level Tokenizer from ...READ MORE

May 5 in Generative AI by prena
235 views
0 votes
0 answers

How to add key-value caching for faster autoregressive text generation.

Can i know How to add key-value ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
115 views
0 votes
1 answer

How to Implement a custom noise scheduler for a diffusion-based image generator

You can implement a custom noise scheduler ...READ MORE

May 5 in Generative AI by nijin
173 views
0 votes
1 answer

How does IPv6 router advertisement scanning work?

IPv6 Router Advertisement (RA) scanning is a ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
149 views
0 votes
1 answer

What is graph-based vulnerability correlation, and why is it useful?

Graph-Based Vulnerability Correlation is an advanced cybersecurity ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
185 views
0 votes
1 answer

How does XMPP enumeration expose messaging servers?

XMPP (Extensible Messaging and Presence Protocol) is ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
172 views
0 votes
1 answer

How can SSH version enumeration expose security risks?

SSH version enumeration refers to the process ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
180 views
0 votes
1 answer

How does Kerberoasting expose Active Directory vulnerabilities?

Kerberoasting is a post-exploitation attack technique that ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
152 views
0 votes
1 answer

What is ICMP address mask scanning, and how is it used?

ICMP Address Mask Scanning is a network ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
198 views
0 votes
1 answer

How does TLS handshake analysis reveal server details?

Analyzing a TLS handshake can reveal critical ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
182 views
0 votes
1 answer

How do attackers use IPv6 DNS queries for stealth enumeration?

Attackers exploit IPv6 DNS queries for stealthy ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
178 views
0 votes
1 answer

How does JARM fingerprinting help in TLS scanning?

JARM (JA3 Active Reconnaissance Method) is an ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
206 views
0 votes
1 answer

What is the risk of open recursive resolvers in DNS?

Open recursive DNS resolvers, which respond to ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
173 views
0 votes
1 answer

How do attackers use zone transfers for DNS enumeration?

Attackers exploit misconfigured DNS servers to perform ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
157 views
0 votes
1 answer

How does ICMP timestamp scanning reveal system uptime?

ICMP (Internet Control Message Protocol) timestamp scanning ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
194 views
0 votes
1 answer

How does HTTP response header analysis aid enumeration?

Analyzing HTTP response headers is a fundamental ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
179 views
0 votes
1 answer

What is TCP window size scanning, and how does it detect OS?

TCP Window Size Scanning is a technique ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
274 views
0 votes
1 answer

How does AI automate banner grabbing for fingerprinting?

AI enhances banner grabbing by automating the ...READ MORE

May 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
176 views
0 votes
1 answer

Write a function to reduce VRAM usage during diffusion-based image synthesis.

To reduce VRAM usage during diffusion-based image ...READ MORE

May 2 in Generative AI by timi
151 views
0 votes
0 answers

How to Fine-tune an LLM using Proximal Policy Optimization (PPO) in transformers library.

Can i know How to Fine-tune an ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
121 views
0 votes
1 answer

Write a script to preprocess human feedback datasets for LLM reinforcement learning.

You can write a script to preprocess ...READ MORE

May 2 in Generative AI by timimi
154 views
0 votes
0 answers

How to implement a function that dynamically weights prompts during reinforcement learning.

Can you tell me How to implement ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
101 views
0 votes
0 answers
0 votes
1 answer

How to Build a PyTorch training loop for a Transformer-based encoder-decoder model.

You can build a PyTorch training loop ...READ MORE

May 2 in Generative AI by wrotila
169 views
0 votes
0 answers

How to modify an LLM to use sliding window attention for long-context processing.

With the help of code can i ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
136 views
0 votes
0 answers

How to implement Neural Cache Augmentation to speed up inference in LLMs.

Can i know How to implement Neural ...READ MORE

May 2 in Generative AI by Ashutosh
• 33,350 points
104 views
0 votes
1 answer

How to implement a Bayesian optimizer to fine-tune Transformer hyperparameters.

You can fine-tune Transformer hyperparameters by using ...READ MORE

May 2 in Generative AI by tommy
178 views
0 votes
0 answers
0 votes
1 answer

How do voice-enabled assistants enhance team collaboration in PRINCE2 Agile projects?

Voice-enabled assistants can improve team cooperation in ...READ MORE

May 2 in PMP by Naira
199 views
0 votes
1 answer

How can AI tools assist in updating the Project Initiation Documentation (PID)?

AI solutions can help to update the ...READ MORE

May 2 in PMP by Naira
208 views
0 votes
1 answer

What happens if I remove or change a sensitivity label in Power BI?

Changing or removing a sensitivity label in ...READ MORE

Apr 30 in Power BI by anonymous
• 36,180 points
200 views
0 votes
1 answer

Can I apply sensitivity labels to Power BI dashboards and tiles?

No, you cannot directly apply sensitivity labels ...READ MORE

Apr 30 in Power BI by anonymous
• 36,180 points
414 views
0 votes
1 answer

How can I view the sensitivity label of a report or dataset in Power BI?

To view the sensitivity label of a ...READ MORE

Apr 30 in Power BI by anonymous
• 36,180 points
221 views
0 votes
1 answer

How do sensitivity labels in Power BI interact with data sources in the cloud versus on-premises?

Sensitivity labels in Power BI are applied ...READ MORE

Apr 30 in Power BI by anonymous
• 36,180 points
201 views
0 votes
1 answer

Does Power BI’s sensitivity labels feature support multi-tenant scenarios?

Power BI's sensitivity labels partially support multi-tenant ...READ MORE

Apr 30 in Power BI by anonymous
• 36,180 points
166 views
0 votes
0 answers

Why Choose Microsoft AZ-104 Certification Exam?

Cloud computing is here to stay, and ...READ MORE

Apr 30 in Others by Exams
• 120 points
154 views
0 votes
1 answer

Can I customize sensitivity labels in Power BI to align with my organization’s security policies?

Yes, you can customize sensitivity labels in ...READ MORE

Apr 29 in Power BI by anonymous
• 36,180 points
232 views
0 votes
1 answer

How can I track changes to sensitivity labels in Power BI reports?

To track changes to sensitivity labels in ...READ MORE

Apr 29 in Power BI by anonymous
• 36,180 points
237 views
0 votes
1 answer

Can I automate the application of sensitivity labels in Power BI using DAX or Power Query?

Automating the application of sensitivity labels in ...READ MORE

Apr 29 in Power BI by anonymous
• 36,180 points
248 views
0 votes
1 answer

How can I prevent users from removing sensitivity labels in Power BI?

To prevent users from modifying or removing ...READ MORE

Apr 29 in Power BI by anonymous
• 36,180 points
294 views
0 votes
1 answer

How can I configure sensitivity labels for Power BI reports shared with external users?

To configure sensitivity labels for Power BI ...READ MORE

Apr 29 in Power BI by anonymous
• 36,180 points
218 views
0 votes
1 answer

How does AI support KPI tracking in large-scale PRINCE2 programs?

AI can greatly improve KPI tracking in ...READ MORE

May 2 in PMP by Naira
209 views
0 votes
1 answer

What AI plugins support PRINCE2 compliance in tools like Trello or Asana?

As of my last update, there are ...READ MORE

May 2 in PMP by Naira
188 views