Trending questions in Edureka Community

0 votes
0 answers

How does horizontal scaling differ from vertical scaling in cloud databases?

I'm confused about when to use horizontal ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
621 views
0 votes
0 answers

What is database autoscaling in cloud environments?

I’ve heard that some cloud databases can ...READ MORE

Jun 24, 2025 in Cloud Computing by Anupam
• 18,960 points
616 views
0 votes
1 answer

Is it possible to design a pyramid-shaped button slicer layout for visual filtering in Power BI?

While Power BI doesn’t natively support a ...READ MORE

Jun 27, 2025 in Power BI by anonymous
• 36,180 points
435 views
0 votes
1 answer

Can users bypass sensitivity labels while exporting reports?

In Power BI, users cannot bypass sensitivity ...READ MORE

Jun 27, 2025 in Power BI by anonymous
• 36,180 points
428 views
0 votes
0 answers

What are the challenges of running a relational database in the cloud?

I'm trying to understand what makes running ...READ MORE

Jun 23, 2025 in Cloud Computing by Anupam
• 18,960 points
644 views
0 votes
1 answer

How to change Power Query parameters directly from the Power BI report interface (without going into Power Query Editor)?

You can use What-If parameters or Power ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
842 views
+1 vote
1 answer

How to lock a pen drive with a password on a mobile device?

In order to password-protect a USB (pen) ...READ MORE

Nov 7, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
10,397 views
0 votes
0 answers

How do you optimize bfloat16 precision for transformer speedup?

With the help of code can you ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
618 views
0 votes
0 answers

How do you perform database failover in cloud environments?

I'm trying to build a more resilient ...READ MORE

Jun 23, 2025 in Cloud Computing by Anupam
• 18,960 points
615 views
0 votes
0 answers

How do you integrate AI with variational quantum eigensolvers (VQE) for optimization?

Can you tell me with the help ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
605 views
0 votes
1 answer

Can I use DAX to apply row-level security by matching a substring in the username to a column value?

Yes, you can implement row-level security (RLS) ...READ MORE

Jun 26, 2025 in Power BI by anonymous
• 36,180 points
420 views
0 votes
0 answers

How do you implement database clustering in cloud environments?

I’m exploring ways to improve scalability and ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
770 views
0 votes
0 answers

How do you optimize federated averaging (FedAvg) for personalized AI models?

With the help of proper code example ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
587 views
0 votes
0 answers

What are cold storage and hot storage in cloud computing?

I’m trying to understand the difference between ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
760 views
0 votes
0 answers

How do you use torch.fx graph transformations for optimized AI model execution?

May i know How do you use ...READ MORE

Jun 23, 2025 in Generative AI by Ashutosh
• 33,350 points
579 views
0 votes
1 answer

How to make multi-language reports in Power BI work using language parameters in the URL?

You can combine Power BI's localization features ...READ MORE

Jun 17, 2025 in Power BI by anonymous
• 36,180 points
782 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

Jun 13, 2025 in Power BI by anonymous
• 36,180 points
953 views
0 votes
0 answers

How does AWS handle disaster recovery?

AWS provides multiple options for data backup ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,960 points
1,427 views
0 votes
0 answers

How does cloud-based encryption work for data at rest?

When cloud providers say data is encrypted ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
723 views
0 votes
0 answers

What is a cloud marketplace, and how does it facilitate app development?

I’ve noticed most cloud providers have something ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
717 views
0 votes
0 answers

How to Implement A3C (Asynchronous Advantage Actor-Critic) for large-scale AI models.

Can i know How to Implement A3C ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
748 views
0 votes
0 answers

How do you design cloud systems for low-latency applications?

I'm building a cloud-based system where low ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
697 views
+1 vote
2 answers

Which function can I use to clear the console in R and RStudio ?

Description                   Windows & Linux           Mac Clear console                      Ctrl+L ...READ MORE

Apr 17, 2018 in Data Analytics by anonymous
92,762 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
944 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
935 views
0 votes
0 answers

What is the AWS shared responsibility model?

AWS and customers share security responsibilities. What ...READ MORE

Jun 3, 2025 in AWS by Anupam
• 18,960 points
1,373 views
0 votes
0 answers

How do you perform automated backups in cloud environments?

I want to set up automated backups ...READ MORE

Jun 19, 2025 in Cloud Computing by Anupam
• 18,960 points
655 views
0 votes
0 answers

how to implement document OCR + LLM pipeline for structured data extraction.

With the help of code let me ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
724 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
883 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
873 views
0 votes
0 answers

How do you fine-tune a code model for a specific programming language?

Can you tell me with the help ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
705 views
0 votes
0 answers

How do you use Service-Oriented Architecture (SOA) in the cloud?

SOA organizes software into reusable services. How ...READ MORE

Jun 16, 2025 in Cloud Computing by Anupam
• 18,960 points
751 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
865 views
0 votes
0 answers

How to implement natural language to SQL translation using an LLM.

Can i know How to implement natural ...READ MORE

Jun 17, 2025 in Generative AI by Ashutosh
• 33,350 points
695 views
0 votes
0 answers

How do you use soft actor-critic (SAC) to optimize AI-generated responses?

Could you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
652 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
849 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
842 views
0 votes
0 answers

How to implement zero-day attack detection using AI-based behavioral analysis.

Can i know How to implement zero-day ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
634 views
0 votes
0 answers

How do you apply projected gradient descent (PGD) to attack AI text models?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
619 views
0 votes
1 answer

How to ensure your DAX measure includes all date values during filtering?

To ensure your DAX measure includes all ...READ MORE

Jun 19, 2025 in Power BI by anonymous
• 36,180 points
520 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
822 views
0 votes
0 answers

how to Implement GLU (Gated Linear Units) to replace feedforward layers in transformers.

May i know how to Implement GLU ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
615 views
0 votes
1 answer

How can I dynamically filter Top N customers based on sales in the most recent fiscal quarter using a time slicer?

To dynamically filter Top N customers based ...READ MORE

Jun 19, 2025 in Power BI by anonymous
• 36,180 points
507 views
0 votes
1 answer

Why does Power Query slow down significantly after merging multiple large tables?

After merging large tables, Power Query lags ...READ MORE

Jun 9, 2025 in Power BI by anonymous
• 36,180 points
953 views
0 votes
0 answers

What is strong consistency, and when do you need it in the cloud?

I’m trying to understand when strong consistency ...READ MORE

Jun 19, 2025 in Cloud Computing by Nidhi
• 16,260 points
561 views
0 votes
0 answers

How do you implement geo-redundant cloud applications?

Geo-redundancy ensures high availability by distributing applications ...READ MORE

Jun 17, 2025 in Cloud Computing by Anupam
• 18,960 points
647 views
0 votes
0 answers

How do you optimize NCCL communication for multi-GPU transformer models?

Can you tell me How do you ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
600 views
0 votes
0 answers

How to Implement adversarial training using fast gradient sign method (FGSM).

Can you tell me with the help ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
598 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13, 2025 by Anupam 801 views
0 votes
0 answers

How do you apply ZeRO stage 3 optimizations for memory-efficient training?

Can i know How do you apply ...READ MORE

Jun 18, 2025 in Generative AI by Ashutosh
• 33,350 points
590 views