Trending questions in Edureka Community

0 votes
0 answers

How do you manage a hybrid cloud architecture?

A hybrid cloud integrates on-premises infrastructure with ...READ MORE

41 minutes ago in Cloud Computing by Anupam
• 18,120 points
5 views
0 votes
0 answers

What are blue-green deployments in cloud computing?

Blue-green deployment is a technique for releasing ...READ MORE

42 minutes ago in Cloud Computing by Anupam
• 18,120 points
5 views
0 votes
0 answers

What is Zero Trust architecture, and how is it applied in the cloud?

Zero Trust means no device or user ...READ MORE

43 minutes ago in Cloud Computing by Anupam
• 18,120 points
3 views
0 votes
0 answers

What are CAP Theorem implications in cloud databases?

The CAP Theorem states that a distributed ...READ MORE

44 minutes ago in Cloud Computing by Anupam
• 18,120 points
3 views
0 votes
0 answers

How do you implement geo-redundant cloud applications?

Geo-redundancy ensures high availability by distributing applications ...READ MORE

44 minutes ago in Cloud Computing by Anupam
• 18,120 points
3 views
0 votes
0 answers

How do you handle query expansion in a retrieval-augmented chatbot?

Can i know How do you handle ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
20 views
0 votes
0 answers

How to implement BitNet quantization for an LLM inference pipeline.

Can you tell me How to implement ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
17 views
0 votes
0 answers

How to Implement dense passage retrieval (DPR) with DistilBERT.

Can you explain to me How to ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
14 views
0 votes
0 answers

How to Implement Pruned MLP Blocks in a transformer for faster inference.

Can i know How to Implement Pruned ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
14 views
0 votes
0 answers

How do you integrate DPR (Dense Passage Retrieval) with BM25 for hybrid search?

Can you tell me How do you ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
14 views
0 votes
0 answers

How do you manage stateless vs. stateful applications in cloud environments?

Stateless apps are easier to scale, while ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
14 views
0 votes
0 answers

How do you integrate Hierarchical Navigable Small World (HNSW) indexing in FAISS?

With the help of proper code example ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
13 views
0 votes
0 answers

How do you apply SmoothQuant to optimize an LLM for edge deployment?

With the help of proper code example ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
13 views
0 votes
0 answers

What are distributed systems in cloud computing, and how do they work?

Distributed systems coordinate multiple components across different ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
13 views
0 votes
0 answers

How do you manage and version Infrastructure as Code (IaC)?

IaC enables automated infrastructure provisioning. How do ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
13 views
0 votes
0 answers

What is edge computing, and how does it interact with cloud computing?

Edge computing processes data closer to the ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
12 views
0 votes
0 answers

What are anti-patterns in cloud architecture?

Anti-patterns are design choices that lead to ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
12 views
0 votes
0 answers

How to implement a custom optimizer based on Lion (EvoLION) for training LLMs.

Can i know How to implement a ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
11 views
0 votes
0 answers

How do you fine-tune an LLM using selective layer freezing?

Can you tell me How do you ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
10 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
10 views
0 votes
0 answers

Write a script to update embeddings in real time using a PostgreSQL+pgvector setup.

With the help of code can i ...READ MORE

1 day ago in Generative AI by Ashutosh
• 32,130 points
9 views
0 votes
0 answers

What are service-level objectives (SLOs) in cloud computing?

SLOs define performance targets for services. How ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
9 views
0 votes
0 answers

How does a cloud-based microservices architecture differ from monolithic architectures?

Microservices break applications into independent services. How ...READ MORE

1 day ago in Cloud Computing by Anupam
• 18,120 points
7 views
0 votes
1 answer

Why is my Power BI custom visual (built with TypeScript) not rendering on the mobile app, even though it works on desktop?

To guarantee that your TypeScript-built Power BI ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
43 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
36 views
0 votes
1 answer

Power BI: Why is cross-filtering between two charts (e.g., BET vs DEPOSIT) not working as expected?

If cross-filtering between charts isn't working: Check Data ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
33 views
0 votes
1 answer

How to dynamically determine and display financial quarter start/end dates on a Power BI chart axis?

To dynamically display financial quarter start and ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
32 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
31 views
0 votes
1 answer

Why does Power BI ignore one filter when another filter leads to no data records?

To stop Power BI from disregarding filters ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
30 views
0 votes
1 answer

How to rank and sort Power BI card visuals by measure values or rank?

To dynamically rank and sort Power BI ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
29 views
0 votes
1 answer

How can I include images and branding in Paginated Reports?

The following techniques can be used to ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
26 views
0 votes
1 answer

What’s the easiest way to add dynamic filters or parameters to a Paginated Report?

Using Report Parameters is the simplest method ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
25 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
23 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
36 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
34 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
33 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
33 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
33 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
32 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
31 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
31 views
0 votes
0 answers

How does Bayesian analysis help in vulnerability risk scoring?

How does Bayesian analysis update the risk ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
30 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
29 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
28 views
0 votes
0 answers

How do honeytokens help detect enumeration attempts?

How do honeytokens, which are fake data ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
28 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
28 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points

closed 3 days ago by Anupam 26 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
25 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
25 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

3 days ago in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
25 views