Trending questions in Edureka Community

0 votes
0 answers

How do you integrate Qualys Risk Management with ServiceNow ITBM? W

I’m looking into integrating Qualys Risk Management ...READ MORE

Apr 7 in PMP by Parshvi
• 7,940 points
104 views
+1 vote
2 answers

Which function can I use to clear the console in R and RStudio ?

Description                   Windows & Linux           Mac Clear console                      Ctrl+L ...READ MORE

Apr 17, 2018 in Data Analytics by anonymous
89,023 views
0 votes
0 answers
0 votes
0 answers

How would you integrate QLoRA with ONNX Runtime for inference?

With the help of code can i ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
97 views
0 votes
0 answers

How do you manage input partitioning for sequential models on TPUs?

Can i know How do you manage ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,140 points
95 views
0 votes
1 answer
0 votes
0 answers

How do you configure TPU memory partitions for complex model architectures?

With help of proper code example can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
94 views
0 votes
0 answers

How do you perform on-the-fly data augmentation on TPUs?

With the help of proper code can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
93 views
0 votes
0 answers

How to validate the generalization gap in QLoRA-adapted models?

Can you tell me How to validate ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
93 views
0 votes
1 answer

Is there any alternative to Nmap for UDP?

​While Nmap is a widely used tool ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
195 views
0 votes
0 answers

What are the benefits of asynchronous execution on TPUs, and how do you enable it?

Can you tell me What are the ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
90 views
0 votes
0 answers

How do you implement a cross-replica operation on TPUs?

Can you tell me How do you ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,140 points
89 views
0 votes
1 answer

Can a VirtualBox VM prevent malware infection in my case?

​VirtualBox virtual machines (VMs) are commonly employed ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
234 views
0 votes
0 answers

How can you adapt a masked language model using QLoRA?

With the help of proper code can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 32,530 points
88 views
0 votes
1 answer

How do data-driven decision support systems (DSS) improve project governance?

DSS enhances project governance by providing real-time ...READ MORE

Apr 4 in PMP by Naira
180 views
0 votes
1 answer

What are the security concerns in using cloud-based PM tools for confidential projects?

Cloud-based PM solutions offer convenience but pose ...READ MORE

Apr 4 in PMP by Naira
179 views
0 votes
1 answer

How do I dynamically rename multiple columns in Power Query based on a mapping table?

To dynamically rename multiple columns in Power ...READ MORE

Apr 1 in Power BI by anonymous
• 33,070 points
301 views
0 votes
1 answer

How would you utilize TPU pods to scale training for a large language model like BERT?

TPU Pods enable large-scale parallelism by distributing ...READ MORE

Apr 7 in Generative AI by rama
152 views
0 votes
1 answer

What are the key benefits of quantum project scheduling in high-uncertainty projects?

QPS is an advanced scheduling approach that ...READ MORE

Apr 4 in PMP by Naira
175 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
182 views
0 votes
1 answer

How do you apply Agile earned value management (Agile EVM) in financial tracking?

Agile EVM merges Agile’s flexibility with traditional ...READ MORE

Apr 4 in PMP by Naira
174 views
0 votes
1 answer

How would you apply unsupervised learning to image denoising using a generative model?

 Use a Denoising Autoencoder (DAE) to learn ...READ MORE

Apr 8 in Generative AI by vibecoding
112 views
0 votes
1 answer

How does a change control board (CCB) impact project scope management?

A Change Control Board (CCB) acts as ...READ MORE

Apr 4 in PMP by Naira
197 views
0 votes
1 answer

What are the challenges in implementing test-driven development (TDD) in Agile?

TDD improves software quality, but it comes ...READ MORE

Apr 4 in PMP by Naira
169 views
0 votes
1 answer

What are the constraints when using critical path method (CPM) in schedule optimization?

CPM is useful for determining the longest ...READ MORE

Apr 4 in PMP by Naira
170 views
0 votes
1 answer

How does story mapping improve backlog refinement?

Story mapping is a visual strategy that ...READ MORE

Apr 4 in PMP by Naira
166 views
0 votes
1 answer
0 votes
1 answer

How would a professional hacker penetrate a computer in a network?

​Penetration testing, often referred to as ethical ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
162 views
0 votes
1 answer

How do you apply earned schedule (ES) analysis in performance measurement?

Earned Schedule (ES) enhances Earned Value Management ...READ MORE

Apr 4 in PMP by Naira
161 views
0 votes
1 answer
0 votes
1 answer

What is the role of scaled Agile frameworks (SAFe, LeSS, DaD) in enterprise projects?

Large-scale Agile implementations require structured frameworks. SAFe, ...READ MORE

Apr 4 in PMP by Naira
156 views
0 votes
1 answer

How do you use trend analysis to predict schedule slippage?

Trend analysis identifies early warning indications of ...READ MORE

Apr 4 in PMP by Naira
157 views
0 votes
1 answer

How do you implement critical chain project management (CCPM) in resource-constrained projects?

CCPM is highly effective when resources are ...READ MORE

Apr 4 in PMP by anonymous
158 views
0 votes
1 answer

How do you implement feature-driven development (FDD) in Agile teams?

Feature-Driven Development (FDD) is a structured Agile ...READ MORE

Apr 4 in PMP by Naira
149 views
0 votes
1 answer

What are the benefits of WIP limits (Work In Progress limits) in Kanban?

WIP limits help teams stay focused and ...READ MORE

Apr 4 in PMP by Naira
148 views
0 votes
1 answer

What is the importance of lead and lag scheduling in complex projects?

Lead and lag adjustments optimize timelines by ...READ MORE

Apr 4 in PMP by Naira
149 views
0 votes
1 answer

How do hackers and security researchers scan the internet for vulnerable servers and devices?

Hackers and security researchers employ various tools ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
148 views
0 votes
1 answer

How does BeEF do a portscan and ping?

​The Browser Exploitation Framework (BeEF) is renowned ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
148 views
0 votes
1 answer

Implement a multi-GPU inference pipeline for a foundation model using DeepSpeed or TensorParallel.

You can implement a multi-GPU inference pipeline ...READ MORE

Apr 1 in Generative AI by safak
282 views
0 votes
1 answer

What are the challenges in using velocity-based forecasting in Agile projects?

Velocity is useful in estimating future sprint ...READ MORE

Apr 4 in PMP by Naira
147 views
0 votes
1 answer

How do you handle incremental vs. iterative development in Agile execution?

Both incremental and iterative development involve delivering ...READ MORE

Apr 4 in PMP by Naira
145 views
0 votes
1 answer
0 votes
1 answer

How would you use the TPU profiler to analyze and optimize model performance?

The TPU profiler helps identify bottlenecks and ...READ MORE

Apr 7 in Generative AI by puja
118 views
0 votes
1 answer

How does dependency determination impact critical path calculations?

Dependencies specify task relationships, and faults in ...READ MORE

Apr 4 in PMP by Naira
144 views
0 votes
1 answer

How does the Program Evaluation and Review Technique (PERT) improve time estimation accuracy?

PERT is an excellent tool for estimating ...READ MORE

Apr 4 in PMP by Naira
146 views
0 votes
1 answer

What are the key components of a project work breakdown structure (WBS)?

A Work Breakdown Structure (WBS) serves as ...READ MORE

Apr 4 in PMP by Naira
166 views
0 votes
1 answer

How does expected monetary value (EMV) analysis assist in decision-making?

EMV allows you to quantify risk in ...READ MORE

Apr 4 in PMP by Naira
143 views
0 votes
1 answer

How does Agile release planning vs. traditional project scheduling compare?

Agile and traditional project scheduling approach work ...READ MORE

Apr 4 in PMP by Naira
136 views
0 votes
1 answer

How to secure my network and system setup?

Securing your network and system setup is ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
136 views
0 votes
1 answer

How does Little’s Law apply to project cycle time estimation?

Little's Law (Work in Progress = Throughput ...READ MORE

Apr 4 in PMP by Naira
135 views