Trending questions in Edureka Community

0 votes
0 answers

How do you optimize NCCL communication for multi-GPU transformer models?

Can you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
624 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13, 2025 by Anupam 823 views
0 votes
0 answers

How do you apply ZeRO stage 3 optimizations for memory-efficient training?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
611 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
816 views
0 votes
0 answers

How to implement custom CUDA kernels for transformer acceleration.

Can i know How to implement custom ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
634 views
0 votes
0 answers

How to implement Q-learning to optimize chatbot response strategies.

Can i know How to implement Q-learning ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
598 views
0 votes
1 answer

Is there a way to programmatically extract a table from a Power BI dashboard when the “Export data” option is disabled?

When "Export Data" is turned off, the ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
584 views
0 votes
0 answers

How to implement failover mechanisms for LLM inference failures.

With the help of code can you ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
625 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
793 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
784 views
0 votes
0 answers

How do you use triton kernels to accelerate transformer block computations?

With the help of code can i ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
578 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

Jun 12, 2025 in SalesForce by Ashutosh
• 33,350 points
833 views
0 votes
0 answers

How to implement Monte Carlo Tree Search (MCTS) in generative AI-driven games.

Can i know How to implement Monte ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
353 views
0 votes
0 answers

How do you balance embedding quality vs. computational cost in LLMs?

Can i know How do you balance ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
602 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
771 views
0 votes
1 answer

How to dynamically display assignees based on hierarchy drill levels in a Power BI matrix (e.g., using Jira data)?

If the user has drilled down to ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
553 views
0 votes
0 answers

How do you secure prompt injections in LLM-based applications?

May i know How do you secure ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
596 views
0 votes
0 answers

How to implement contrastive debiasing for ethical AI model training.

Can i know How to implement contrastive ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
599 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
755 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
750 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13, 2025 by Anupam 743 views
0 votes
0 answers

why is my formula field not displaying data after a record update?

May i know why is my formula ...READ MORE

Jun 11, 2025 in SalesForce by Nidhi
• 16,260 points
832 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
738 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities? [closed]

Behavioral analysis monitors application behavior during runtime, ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13, 2025 by Anupam 736 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
729 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13, 2025 by Anupam 720 views
0 votes
1 answer

Why does a seemingly small Power BI query consume several gigabytes of memory?

Numerous performance-affecting factors can lead to high ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
503 views
0 votes
0 answers

How do you handle data integrity in cloud storage?

We're storing critical data in the cloud ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
470 views
0 votes
0 answers

How do deep learning models enhance IDS evasion detection?

How can deep learning models improve intrusion ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
717 views
0 votes
0 answers

how do i troubleshoot issues with duplicate rule matching in salesforce?

Can i know how do i troubleshoot ...READ MORE

Jun 12, 2025 in SalesForce by Ashutosh
• 33,350 points
760 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
710 views
0 votes
0 answers

why is my trigger firing multiple times when i update a record?

Can i know why is my trigger ...READ MORE

Jun 11, 2025 in SalesForce by Nidhi
• 16,260 points
797 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

Jun 13, 2025 in Power BI by anonymous
• 36,180 points
665 views
0 votes
1 answer

How do I pivot and unpivot columns dynamically in Power BI?

To dynamically pivot or unpivot columns in ...READ MORE

Jun 9, 2025 in Power BI by anonymous
• 36,180 points
841 views
0 votes
0 answers

why is my data import wizard not processing records correctly?

Can you tell me why is my ...READ MORE

Jun 11, 2025 in SalesForce by Nidhi
• 16,260 points
784 views
0 votes
1 answer

How does SMTP VRFY and EXPN enumeration reveal valid emails?

SMTP commands like VRFY and EXPN are ...READ MORE

Apr 24, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,808 views
0 votes
0 answers

how do i fix a “too many dml statements” error in my apex code?

Can you tell me how do i ...READ MORE

Jun 11, 2025 in SalesForce by Ashutosh
• 33,350 points
768 views
0 votes
1 answer

What is the correct syntax for a DAX query expression used in a measure or calculated column?

There is a basic structure to the ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
452 views
0 votes
1 answer

How to handle column type inconsistencies in Power BI transformations?

In Power BI, managing column-type inconsistencies is ...READ MORE

Jun 10, 2025 in Power BI by anonymous
• 36,180 points
750 views
0 votes
1 answer

Why does my date field show a one-year offset in Power BI Desktop but not in the service?

The issue where a date field shows ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
434 views
0 votes
1 answer

How do I deal with errors or failed deployments in Power BI’s deployment pipeline?

Verify the error messages and deployment status. Power ...READ MORE

Jun 3, 2025 in Power BI by anonymous
• 36,180 points
1,023 views
0 votes
0 answers

how do i resolve data mapping issues in an etl integration with salesforce?

Can i know how do i resolve ...READ MORE

Jun 10, 2025 in SalesForce by Ashutosh
• 33,350 points
765 views
0 votes
1 answer

How can you scrape data from multiple pages when the URL doesn't change (e.g., "Load more" button)?

You would need to mimic the user ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
406 views
0 votes
1 answer

How to rank and sort Power BI card visuals by measure values or rank?

To dynamically rank and sort Power BI ...READ MORE

Jun 13, 2025 in Power BI by anonymous
• 36,180 points
583 views
0 votes
0 answers

How does data replication work in cloud databases?

I'm using a cloud-based database and want ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
361 views
0 votes
0 answers

What is a cloud service broker, and how is it used? [closed]

With the help of code can i ...READ MORE

Jun 10, 2025 in SalesForce by Nidhi
• 16,260 points

closed Jun 10, 2025 by Anupam 743 views
0 votes
0 answers

how do i resolve the “too many soql queries: 101” error?

Can i know how do i resolve ...READ MORE

Jun 11, 2025 in SalesForce by Ashutosh
• 33,350 points
694 views
0 votes
0 answers

How do you manage storage tiers in cloud services?

Cloud providers offer different storage tiers, but ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
346 views
0 votes
1 answer

How do I transform nested JSON API data into a tabular format in Power BI?

Because JSON responses frequently contain hierarchical structures ...READ MORE

Jun 10, 2025 in Power BI by anonymous
• 36,180 points
691 views
0 votes
0 answers

why is my data export failing for large data sets in salesforce?

May i know why is my data ...READ MORE

Jun 11, 2025 in SalesForce by Ashutosh
• 33,350 points
682 views