Unanswered questions in Edureka Community

0 votes
0 answers

How to Implement dense passage retrieval (DPR) with DistilBERT.

Can you explain to me How to ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
7 views
0 votes
0 answers

How do you handle query expansion in a retrieval-augmented chatbot?

Can i know How do you handle ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
9 views
0 votes
0 answers

How do you integrate Hierarchical Navigable Small World (HNSW) indexing in FAISS?

With the help of proper code example ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
7 views
0 votes
0 answers

How to implement BitNet quantization for an LLM inference pipeline.

Can you tell me How to implement ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
8 views
0 votes
0 answers

How to Implement Pruned MLP Blocks in a transformer for faster inference.

Can i know How to Implement Pruned ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
7 views
0 votes
0 answers

How do you apply SmoothQuant to optimize an LLM for edge deployment?

With the help of proper code example ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
6 views
0 votes
0 answers

How do you fine-tune an LLM using selective layer freezing?

Can you tell me How do you ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
4 views
0 votes
0 answers

How to implement a custom optimizer based on Lion (EvoLION) for training LLMs.

Can i know How to implement a ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
4 views
0 votes
0 answers

How do you integrate DPR (Dense Passage Retrieval) with BM25 for hybrid search?

Can you tell me How do you ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
6 views
0 votes
0 answers

Write a script to update embeddings in real time using a PostgreSQL+pgvector setup.

With the help of code can i ...READ MORE

5 hours ago in Generative AI by Ashutosh
• 32,130 points
3 views
0 votes
0 answers

What are distributed systems in cloud computing, and how do they work?

Distributed systems coordinate multiple components across different ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
6 views
0 votes
0 answers

What is edge computing, and how does it interact with cloud computing?

Edge computing processes data closer to the ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
5 views
0 votes
0 answers

How do you manage stateless vs. stateful applications in cloud environments?

Stateless apps are easier to scale, while ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
6 views
0 votes
0 answers

What are service-level objectives (SLOs) in cloud computing?

SLOs define performance targets for services. How ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
3 views
0 votes
0 answers

How do you manage and version Infrastructure as Code (IaC)?

IaC enables automated infrastructure provisioning. How do ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
4 views
0 votes
0 answers

What are anti-patterns in cloud architecture?

Anti-patterns are design choices that lead to ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
4 views
0 votes
0 answers

How does a cloud-based microservices architecture differ from monolithic architectures?

Microservices break applications into independent services. How ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
4 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

5 hours ago in Cloud Computing by Anupam
• 17,960 points
5 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
27 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
29 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
30 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
29 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
30 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
22 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
24 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
25 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
27 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
20 views
0 votes
0 answers

How do deep learning models enhance IDS evasion detection?

How can deep learning models improve intrusion ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
20 views
0 votes
0 answers

How do honeytokens help detect enumeration attempts?

How do honeytokens, which are fake data ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
25 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
22 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
22 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
23 views
0 votes
0 answers

How does Bayesian analysis help in vulnerability risk scoring?

How does Bayesian analysis update the risk ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
26 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
32 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
30 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
22 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

2 days ago in Cyber Security & Ethical Hacking by Anupam
• 17,960 points
25 views
0 votes
0 answers

Write a script to integrate LangChain’s VectorDB Retriever with FAISS/HNSW.

Can you let me know Write a ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
34 views
0 votes
0 answers

How to implement a real-time embedding refresh mechanism for a semantic search pipeline.

Can i know How to implement a ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
31 views
0 votes
0 answers

How do you modify a BART tokenizer to handle custom special tokens?

Can you tell me How do you ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
33 views
0 votes
0 answers

How do you implement multi-turn conversation fine-tuning using SFT with ChatML formatting?

With the help of proper examples of ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
29 views
0 votes
0 answers

Write a custom Hugging Face dataset loader for fine-tuning on a JSONL dataset.

Can i know Write a custom Hugging ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
35 views
0 votes
0 answers

Write a script to log perplexity metrics while training a decoder-only transformer.

Can you tell me Write a script ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
20 views
0 votes
0 answers

How does on-demand weight loading optimize GPU VRAM for LLM hosting?

With the help of proper code example ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
18 views
0 votes
0 answers

How do you optimize Faiss/HNSW index refresh in real-time RAG applications?

Can i know with the help of ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
19 views
0 votes
0 answers

how do i troubleshoot issues with duplicate rule matching in salesforce?

Can i know how do i troubleshoot ...READ MORE

4 days ago in SalesForce by Ashutosh
• 32,130 points
25 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

4 days ago in SalesForce by Ashutosh
• 32,130 points
23 views
0 votes
0 answers

How do you use Bootstrap Your Own Latent (BYOL) for self-supervised multimodal learning?

With the help of code may i ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
27 views
0 votes
0 answers

How do you compare SimCSE vs. TSDAE for sentence representation learning?

Can you tell me How do you ...READ MORE

4 days ago in Generative AI by Ashutosh
• 32,130 points
21 views