Trending questions in Edureka Community

0 votes
0 answers

How do you configure cloud-native application load balancing?

I'm deploying a cloud-native app and need ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
138 views
0 votes
0 answers

What is eventual consistency in cloud storage systems?

I keep hearing that some cloud storage ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
135 views
0 votes
0 answers

What is Object Storage in cloud computing?

I keep hearing about Object Storage in ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
131 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
379 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
376 views
0 votes
0 answers

What is Block Storage in cloud computing?

Can someone clarify what block storage is ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
120 views
0 votes
0 answers

How do you integrate Hierarchical Navigable Small World (HNSW) indexing in FAISS?

With the help of proper code example ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
250 views
0 votes
0 answers

How do you set up a VPN in AWS?

A VPN allows secure connections between on-premises ...READ MORE

Jun 4 in AWS by Anupam
• 18,960 points
768 views
0 votes
0 answers

What is edge computing, and how does it interact with cloud computing?

Edge computing processes data closer to the ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
244 views
0 votes
1 answer

How to write a DAX running total that respects its own resource hierarchy and resets appropriately?

To create a DAX running total that ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
141 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
348 views
0 votes
0 answers

What are common cloud architecture frameworks (e.g., AWS Well-Architected Framework)?

Cloud providers offer architecture frameworks to guide ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
183 views
0 votes
0 answers

How do you manage a hybrid cloud architecture?

A hybrid cloud integrates on-premises infrastructure with ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
182 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
306 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
302 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
330 views
0 votes
0 answers

How to implement cross-modal contrastive loss for text-image understanding.

Can you tell me How to implement ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
160 views
0 votes
0 answers

What is Zero Trust architecture, and how is it applied in the cloud?

Zero Trust means no device or user ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
162 views
0 votes
0 answers

How do you ensure network latency optimization in multi-cloud setups?

Multi-cloud setups can introduce latency due to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
156 views
0 votes
0 answers

How to implement speech-to-text models using wav2vec and transformers.

Can i know How to implement speech-to-text ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
145 views
0 votes
0 answers

How do you fine-tune an LLM to generate structured outputs like JSON or XML?

Can i know How do you fine-tune ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
139 views
0 votes
0 answers

How to Implement FP8 quantization for LLM inference acceleration.

Can you tell me with the help ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
139 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
277 views
+1 vote
2 answers

How to convert entire div data into image and save it into directory without using canvas?

Hello @kartik, You can try the sample code ...READ MORE

Apr 29, 2020 in Java-Script by Niroj
• 82,800 points
76,040 views
0 votes
0 answers

How to implement BitNet quantization for an LLM inference pipeline.

Can you tell me How to implement ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
191 views
0 votes
0 answers

How do you improve embedding similarity search in AI retrieval systems?

With the help of code can i ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
137 views
+1 vote
5 answers

How to get user's IP address in Laravel?

Hey, We can get the user's IP address ...READ MORE

Mar 20, 2020 in Laravel by Niroj
• 82,800 points
76,783 views
0 votes
0 answers

What is a canary deployment in cloud environments?

Canary deployments involve rolling out changes to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
143 views
0 votes
0 answers

How do you integrate dynamic attention pruning in transformers?

Can i know How do you integrate ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
138 views
0 votes
0 answers

How to Implement BLIP-2 fine-tuning for caption generation.

With the help of code can you ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
137 views
0 votes
0 answers

how to Implement LLM-based fraud detection in financial transactions.

Can i know how to Implement LLM-based ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
131 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
299 views
0 votes
0 answers

How to implement Sparse Transformers for memory-efficient training.

With the help of proper code example ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
127 views
0 votes
0 answers

How do you train a custom WordPiece tokenizer for an AI model?

Can i know How do you train ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
128 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
289 views
0 votes
0 answers

How to implement error-aware code generation using AI models.

With the help of proper code examples ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
121 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
287 views
0 votes
0 answers

How do you detect backdoor attacks in pre-trained LLMs?

With the help of python programming can ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
119 views
0 votes
0 answers

What are distributed systems in cloud computing, and how do they work?

Distributed systems coordinate multiple components across different ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
167 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
284 views
0 votes
1 answer

Why is my Power BI custom visual (built with TypeScript) not rendering on the mobile app, even though it works on desktop?

To guarantee that your TypeScript-built Power BI ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
248 views
0 votes
0 answers

What are CAP Theorem implications in cloud databases?

The CAP Theorem states that a distributed ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
119 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
279 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 273 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
272 views
0 votes
1 answer

How do I pivot and unpivot columns dynamically in Power BI?

To dynamically pivot or unpivot columns in ...READ MORE

Jun 9 in Power BI by anonymous
• 36,180 points
413 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
270 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
270 views
0 votes
0 answers

What are blue-green deployments in cloud computing?

Blue-green deployment is a technique for releasing ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
108 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 270 views