Trending questions in Edureka Community

0 votes
0 answers

How do you optimize federated averaging (FedAvg) for personalized AI models?

With the help of proper code example ...READ MORE

Jun 23 in Generative AI by Ashutosh
• 33,350 points
278 views
0 votes
0 answers

How do you implement database clustering in cloud environments?

I’m exploring ways to improve scalability and ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
450 views
0 votes
0 answers

How do you use torch.fx graph transformations for optimized AI model execution?

May i know How do you use ...READ MORE

Jun 23 in Generative AI by Ashutosh
• 33,350 points
275 views
0 votes
0 answers

What are cold storage and hot storage in cloud computing?

I’m trying to understand the difference between ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
405 views
0 votes
0 answers

How does cloud-based encryption work for data at rest?

When cloud providers say data is encrypted ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
394 views
0 votes
1 answer

How can I dynamically filter Top N customers based on sales in the most recent fiscal quarter using a time slicer?

To dynamically filter Top N customers based ...READ MORE

Jun 19 in Power BI by anonymous
• 36,180 points
331 views
0 votes
0 answers

How to Implement A3C (Asynchronous Advantage Actor-Critic) for large-scale AI models.

Can i know How to Implement A3C ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
426 views
0 votes
0 answers

How do you design cloud systems for low-latency applications?

I'm building a cloud-based system where low ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
383 views
0 votes
0 answers

What is a cloud marketplace, and how does it facilitate app development?

I’ve noticed most cloud providers have something ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
374 views
0 votes
0 answers

How do you implement geo-redundant cloud applications?

Geo-redundancy ensures high availability by distributing applications ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
424 views
0 votes
0 answers

How to implement Monte Carlo Tree Search (MCTS) in generative AI-driven games.

Can i know How to implement Monte ...READ MORE

Jun 23 in Generative AI by Ashutosh
• 33,350 points
160 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
456 views
0 votes
0 answers

How do you perform automated backups in cloud environments?

I want to set up automated backups ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
319 views
0 votes
0 answers

How do you fine-tune a code model for a specific programming language?

Can you tell me with the help ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
396 views
0 votes
1 answer

How to make multi-language reports in Power BI work using language parameters in the URL?

You can combine Power BI's localization features ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
345 views
0 votes
0 answers

How to implement natural language to SQL translation using an LLM.

Can i know How to implement natural ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
391 views
0 votes
0 answers

What is strong consistency, and when do you need it in the cloud?

I’m trying to understand when strong consistency ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
303 views
0 votes
1 answer

How to ensure your DAX measure includes all date values during filtering?

To ensure your DAX measure includes all ...READ MORE

Jun 19 in Power BI by anonymous
• 36,180 points
247 views
0 votes
0 answers

how to implement document OCR + LLM pipeline for structured data extraction.

With the help of code let me ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
376 views
0 votes
0 answers

How do you handle data integrity in cloud storage?

We're storing critical data in the cloud ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
290 views
0 votes
0 answers

How do you use soft actor-critic (SAC) to optimize AI-generated responses?

Could you tell me How do you ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
323 views
0 votes
0 answers

How to implement zero-day attack detection using AI-based behavioral analysis.

Can i know How to implement zero-day ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
316 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
516 views
0 votes
0 answers

how to Implement GLU (Gated Linear Units) to replace feedforward layers in transformers.

May i know how to Implement GLU ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
299 views
0 votes
0 answers

How do you apply ZeRO stage 3 optimizations for memory-efficient training?

Can i know How do you apply ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
295 views
0 votes
0 answers

How do you set up VPC (Virtual Private Cloud) in AWS?

A VPC allows you to define a ...READ MORE

Jun 5 in AWS by Anupam
• 18,960 points
857 views
0 votes
1 answer

Is there a way to programmatically extract a table from a Power BI dashboard when the “Export data” option is disabled?

When "Export Data" is turned off, the ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
284 views
0 votes
0 answers

How to implement custom CUDA kernels for transformer acceleration.

Can i know How to implement custom ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
328 views
0 votes
0 answers

How do you apply projected gradient descent (PGD) to attack AI text models?

Can i know How do you apply ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
293 views
0 votes
0 answers

How do you optimize NCCL communication for multi-GPU transformer models?

Can you tell me How do you ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
293 views
0 votes
1 answer

How to change Power Query parameters directly from the Power BI report interface (without going into Power Query Editor)?

You can use What-If parameters or Power ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
275 views
0 votes
0 answers

How do you deploy a containerized application using AWS ECS or EKS?

ECS and EKS are AWS services for ...READ MORE

Jun 4 in AWS by Anupam
• 18,960 points
889 views
0 votes
0 answers

How to Implement adversarial training using fast gradient sign method (FGSM).

Can you tell me with the help ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
280 views
0 votes
0 answers

How to implement Q-learning to optimize chatbot response strategies.

Can i know How to implement Q-learning ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
279 views
0 votes
0 answers

How do you use triton kernels to accelerate transformer block computations?

With the help of code can i ...READ MORE

Jun 18 in Generative AI by Ashutosh
• 33,350 points
276 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
476 views
0 votes
0 answers

How do you balance embedding quality vs. computational cost in LLMs?

Can i know How do you balance ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
301 views
0 votes
0 answers

How to implement failover mechanisms for LLM inference failures.

With the help of code can you ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
289 views
0 votes
0 answers

How do you secure prompt injections in LLM-based applications?

May i know How do you secure ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
287 views
0 votes
0 answers

How to implement contrastive debiasing for ethical AI model training.

Can i know How to implement contrastive ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
288 views
0 votes
1 answer

What is the correct syntax for a DAX query expression used in a measure or calculated column?

There is a basic structure to the ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
227 views
0 votes
0 answers

How do you set up a VPN in AWS?

A VPN allows secure connections between on-premises ...READ MORE

Jun 4 in AWS by Anupam
• 18,960 points
841 views
0 votes
1 answer

How to dynamically display assignees based on hierarchy drill levels in a Power BI matrix (e.g., using Jira data)?

If the user has drilled down to ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
224 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
436 views
0 votes
0 answers

How does data replication work in cloud databases?

I'm using a cloud-based database and want ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
176 views
0 votes
1 answer

Why does a seemingly small Power BI query consume several gigabytes of memory?

Numerous performance-affecting factors can lead to high ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
205 views
0 votes
0 answers

How do you manage storage tiers in cloud services?

Cloud providers offer different storage tiers, but ...READ MORE

Jun 19 in Cloud Computing by Nidhi
• 16,260 points
171 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
419 views
0 votes
1 answer

Why does my date field show a one-year offset in Power BI Desktop but not in the service?

The issue where a date field shows ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
197 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
412 views