Trending questions in Edureka Community

0 votes
0 answers

How to implement Winograd convolution for efficient transformer feedforward networks.

With the help of proper code example ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
773 views
0 votes
1 answer

How do you clean up or optimize a Power BI report connected via a live connection to a dataset?

To optimize a Power BI report connected ...READ MORE

Jun 27, 2025 in Power BI by anonymous
• 36,180 points
548 views
0 votes
0 answers

How do you use Ansible for configuration management in cloud environments?

I’ve heard a lot about Ansible for ...READ MORE

Jun 25, 2025 in Cloud Computing by Anupam
• 18,960 points
677 views
0 votes
0 answers

How do you optimize neurosymbolic AI for structured knowledge representation?

With the help of code can i ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
758 views
0 votes
0 answers

How to implement spatiotemporal transformers for multimodal event detection.

Can i know How to implement spatiotemporal ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
758 views
0 votes
0 answers

What are the differences between Terraform and CloudFormation?

I’m deciding between Terraform and AWS CloudFormation ...READ MORE

Jun 25, 2025 in Cloud Computing by Anupam
• 18,960 points
669 views
0 votes
0 answers

How do you ensure fault tolerance in cloud databases?

I'm looking into fault tolerance for cloud-based ...READ MORE

Jun 23, 2025 in Cloud Computing by Anupam
• 18,960 points
756 views
0 votes
1 answer

Is it possible to design a pyramid-shaped button slicer layout for visual filtering in Power BI?

While Power BI doesn’t natively support a ...READ MORE

Jun 27, 2025 in Power BI by anonymous
• 36,180 points
534 views
0 votes
0 answers

How do you manage cross-region replication for databases in the cloud?

I'm trying to set up cross-region replication ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
711 views
0 votes
0 answers

What are multi-master and leader-follower architectures in cloud databases?

When reading about cloud database architectures, I ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
700 views
0 votes
0 answers

How does horizontal scaling differ from vertical scaling in cloud databases?

I'm confused about when to use horizontal ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
682 views
0 votes
1 answer

Can I use DAX to apply row-level security by matching a substring in the username to a column value?

Yes, you can implement row-level security (RLS) ...READ MORE

Jun 26, 2025 in Power BI by anonymous
• 36,180 points
541 views
0 votes
0 answers

What is database autoscaling in cloud environments?

I’ve heard that some cloud databases can ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
678 views
0 votes
0 answers

What are the challenges of running a relational database in the cloud?

I'm trying to understand what makes running ...READ MORE

Jun 23, 2025 in Cloud Computing by Anupam
• 18,960 points
713 views
0 votes
0 answers

How do you optimize bfloat16 precision for transformer speedup?

With the help of code can you ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
677 views
0 votes
0 answers

How do you perform database failover in cloud environments?

I'm trying to build a more resilient ...READ MORE

Jun 23, 2025 in Cloud Computing by Anupam
• 18,960 points
675 views
0 votes
0 answers

How do you integrate AI with variational quantum eigensolvers (VQE) for optimization?

Can you tell me with the help ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
662 views
0 votes
0 answers

How do you implement database clustering in cloud environments?

I’m exploring ways to improve scalability and ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
825 views
0 votes
0 answers

How do you optimize federated averaging (FedAvg) for personalized AI models?

With the help of proper code example ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
650 views
0 votes
0 answers

What are cold storage and hot storage in cloud computing?

I’m trying to understand the difference between ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
823 views
0 votes
0 answers

How do you use torch.fx graph transformations for optimized AI model execution?

May i know How do you use ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
638 views
0 votes
0 answers

How does AWS handle disaster recovery?

AWS provides multiple options for data backup ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,960 points
1,501 views
0 votes
1 answer

How to ensure your DAX measure includes all date values during filtering?

To ensure your DAX measure includes all ...READ MORE

Jun 19, 2025 in Power BI by anonymous
• 36,180 points
735 views
0 votes
0 answers

How does cloud-based encryption work for data at rest?

When cloud providers say data is encrypted ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
787 views
0 votes
0 answers

What is a cloud marketplace, and how does it facilitate app development?

I’ve noticed most cloud providers have something ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
781 views
0 votes
1 answer

How does SMTP VRFY and EXPN enumeration reveal valid emails?

SMTP commands like VRFY and EXPN are ...READ MORE

Apr 24, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,157 views
0 votes
0 answers

How to Implement A3C (Asynchronous Advantage Actor-Critic) for large-scale AI models.

Can i know How to Implement A3C ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
808 views
0 votes
0 answers

What is the AWS shared responsibility model?

AWS and customers share security responsibilities. What ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,960 points
1,449 views
0 votes
0 answers

How do you design cloud systems for low-latency applications?

I'm building a cloud-based system where low ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
756 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
996 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
995 views
0 votes
0 answers

how to implement document OCR + LLM pipeline for structured data extraction.

With the help of code let me ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
803 views
0 votes
1 answer

Can I reuse my Power BI semantic model (dataset) in Paginated Reports?

It is possible to reuse your Power ...READ MORE

Jun 11, 2025 in Power BI by anonymous
• 36,180 points
1,014 views
0 votes
0 answers

How do you perform automated backups in cloud environments?

I want to set up automated backups ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
709 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
949 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

Jun 16, 2025 in Cloud Computing by Anupam
• 18,960 points
820 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
931 views
0 votes
1 answer

How can I dynamically filter Top N customers based on sales in the most recent fiscal quarter using a time slicer?

To dynamically filter Top N customers based ...READ MORE

Jun 19, 2025 in Power BI by anonymous
• 36,180 points
621 views
0 votes
0 answers

How do you fine-tune a code model for a specific programming language?

Can you tell me with the help ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
758 views
0 votes
0 answers

How to implement natural language to SQL translation using an LLM.

Can i know How to implement natural ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
757 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
922 views
0 votes
0 answers

How do you use soft actor-critic (SAC) to optimize AI-generated responses?

Could you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
706 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
911 views
0 votes
0 answers

How to implement zero-day attack detection using AI-based behavioral analysis.

Can i know How to implement zero-day ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
704 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
907 views
0 votes
0 answers

How do you apply projected gradient descent (PGD) to attack AI text models?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
677 views
0 votes
0 answers

how to Implement GLU (Gated Linear Units) to replace feedforward layers in transformers.

May i know how to Implement GLU ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
676 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
875 views
0 votes
0 answers

How to Implement adversarial training using fast gradient sign method (FGSM).

Can you tell me with the help ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
665 views
0 votes
1 answer

Is there a way to programmatically extract a table from a Power BI dashboard when the “Export data” option is disabled?

When "Export Data" is turned off, the ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
655 views