Trending questions in Edureka Community

0 votes
0 answers

How do you manage storage tiers in cloud services?

Cloud providers offer different storage tiers, but ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
177 views
0 votes
1 answer

Why does a seemingly small Power BI query consume several gigabytes of memory?

Numerous performance-affecting factors can lead to high ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
207 views
0 votes
0 answers

How do you optimize costs for cloud-based storage?

Our cloud storage costs are starting to ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
170 views
0 votes
1 answer

Why does my date field show a one-year offset in Power BI Desktop but not in the service?

The issue where a date field shows ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
201 views
0 votes
0 answers

What is cloud federation, and how does it work across multiple providers?

I’ve come across the term cloud federation ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
168 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
405 views
0 votes
1 answer

How can you scrape data from multiple pages when the URL doesn't change (e.g., "Load more" button)?

You would need to mimic the user ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
187 views
0 votes
0 answers

How do you configure cloud-native application load balancing?

I'm deploying a cloud-native app and need ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
154 views
0 votes
0 answers

What is eventual consistency in cloud storage systems?

I keep hearing that some cloud storage ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
148 views
0 votes
0 answers

What is Object Storage in cloud computing?

I keep hearing about Object Storage in ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
141 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
388 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
380 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
379 views
0 votes
0 answers

How do you integrate Hierarchical Navigable Small World (HNSW) indexing in FAISS?

With the help of proper code example ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
258 views
0 votes
0 answers

What is Block Storage in cloud computing?

Can someone clarify what block storage is ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
127 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
374 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
373 views
0 votes
0 answers

What is edge computing, and how does it interact with cloud computing?

Edge computing processes data closer to the ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
252 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
368 views
+1 vote
5 answers

How to get user's IP address in Laravel?

Hey, We can get the user's IP address ...READ MORE

Mar 20, 2020 in Laravel by Niroj
• 82,800 points
76,845 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 366 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
365 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

Jun 12 in SalesForce by Ashutosh
• 33,350 points
414 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
364 views
0 votes
1 answer

How to write a DAX running total that respects its own resource hierarchy and resets appropriately?

To create a DAX running total that ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
148 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
363 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
329 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 359 views
0 votes
0 answers

How do you manage a hybrid cloud architecture?

A hybrid cloud integrates on-premises infrastructure with ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
196 views
0 votes
0 answers

What are common cloud architecture frameworks (e.g., AWS Well-Architected Framework)?

Cloud providers offer architecture frameworks to guide ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
194 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities? [closed]

Behavioral analysis monitors application behavior during runtime, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 356 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
315 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 346 views
0 votes
0 answers

How do deep learning models enhance IDS evasion detection?

How can deep learning models improve intrusion ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
345 views
0 votes
0 answers

What is Zero Trust architecture, and how is it applied in the cloud?

Zero Trust means no device or user ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
174 views
0 votes
0 answers

How to implement cross-modal contrastive loss for text-image understanding.

Can you tell me How to implement ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
169 views
0 votes
0 answers

How to implement speech-to-text models using wav2vec and transformers.

Can i know How to implement speech-to-text ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
157 views
0 votes
0 answers

How do you ensure network latency optimization in multi-cloud setups?

Multi-cloud setups can introduce latency due to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
161 views
0 votes
0 answers

How to Implement FP8 quantization for LLM inference acceleration.

Can you tell me with the help ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
147 views
0 votes
0 answers

How to implement BitNet quantization for an LLM inference pipeline.

Can you tell me How to implement ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
200 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
285 views
0 votes
0 answers

why is my formula field not displaying data after a record update?

May i know why is my formula ...READ MORE

Jun 11 in SalesForce by Nidhi
• 16,260 points
408 views
0 votes
0 answers

How do you fine-tune an LLM to generate structured outputs like JSON or XML?

Can i know How do you fine-tune ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
145 views
0 votes
0 answers

how to Implement LLM-based fraud detection in financial transactions.

Can i know how to Implement LLM-based ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
144 views
0 votes
0 answers

How do you improve embedding similarity search in AI retrieval systems?

With the help of code can i ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
144 views
0 votes
0 answers

What is a canary deployment in cloud environments?

Canary deployments involve rolling out changes to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
151 views
0 votes
0 answers

why is my trigger firing multiple times when i update a record?

Can i know why is my trigger ...READ MORE

Jun 11 in SalesForce by Nidhi
• 16,260 points
404 views
0 votes
0 answers

How to Implement BLIP-2 fine-tuning for caption generation.

With the help of code can you ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
146 views
0 votes
0 answers

How do you integrate dynamic attention pruning in transformers?

Can i know How do you integrate ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
146 views
0 votes
0 answers

how do i troubleshoot issues with duplicate rule matching in salesforce?

Can i know how do i troubleshoot ...READ MORE

Jun 12 in SalesForce by Ashutosh
• 33,350 points
361 views