Trending questions in Edureka Community

0 votes
0 answers

How do you optimize costs for cloud-based storage?

Our cloud storage costs are starting to ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
163 views
0 votes
0 answers

What is cloud federation, and how does it work across multiple providers?

I’ve come across the term cloud federation ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
163 views
0 votes
1 answer

How can you scrape data from multiple pages when the URL doesn't change (e.g., "Load more" button)?

You would need to mimic the user ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
184 views
0 votes
0 answers

How do you configure cloud-native application load balancing?

I'm deploying a cloud-native app and need ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
145 views
0 votes
0 answers

What is eventual consistency in cloud storage systems?

I keep hearing that some cloud storage ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
141 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
389 views
+1 vote
2 answers

How to convert entire div data into image and save it into directory without using canvas?

Hello @kartik, You can try the sample code ...READ MORE

Apr 29, 2020 in Java-Script by Niroj
• 82,800 points
76,114 views
0 votes
0 answers

What is Object Storage in cloud computing?

I keep hearing about Object Storage in ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
133 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
378 views
0 votes
0 answers

How do you integrate Hierarchical Navigable Small World (HNSW) indexing in FAISS?

With the help of proper code example ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
255 views
0 votes
0 answers

What is Block Storage in cloud computing?

Can someone clarify what block storage is ...READ MORE

Jun 19 in Cloud Computing by Anupam
• 18,960 points
122 views
0 votes
0 answers

What is edge computing, and how does it interact with cloud computing?

Edge computing processes data closer to the ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
250 views
0 votes
1 answer

How to write a DAX running total that respects its own resource hierarchy and resets appropriately?

To create a DAX running total that ...READ MORE

Jun 17 in Power BI by anonymous
• 36,180 points
146 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
319 views
0 votes
0 answers

What are common cloud architecture frameworks (e.g., AWS Well-Architected Framework)?

Cloud providers offer architecture frameworks to guide ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
186 views
0 votes
0 answers

How do you manage a hybrid cloud architecture?

A hybrid cloud integrates on-premises infrastructure with ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
186 views
0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
309 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
339 views
+1 vote
5 answers

How to get user's IP address in Laravel?

Hey, We can get the user's IP address ...READ MORE

Mar 20, 2020 in Laravel by Niroj
• 82,800 points
76,814 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
332 views
0 votes
0 answers

What is Zero Trust architecture, and how is it applied in the cloud?

Zero Trust means no device or user ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
169 views
0 votes
0 answers

How to implement cross-modal contrastive loss for text-image understanding.

Can you tell me How to implement ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
164 views
0 votes
0 answers

How to implement speech-to-text models using wav2vec and transformers.

Can i know How to implement speech-to-text ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
152 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
322 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
322 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
320 views
0 votes
0 answers

How do you ensure network latency optimization in multi-cloud setups?

Multi-cloud setups can introduce latency due to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
158 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
318 views
0 votes
0 answers

How to Implement FP8 quantization for LLM inference acceleration.

Can you tell me with the help ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
145 views
0 votes
0 answers

How to implement BitNet quantization for an LLM inference pipeline.

Can you tell me How to implement ...READ MORE

Jun 16 in Generative AI by Ashutosh
• 33,350 points
197 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
281 views
0 votes
0 answers

How do you improve embedding similarity search in AI retrieval systems?

With the help of code can i ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
142 views
0 votes
0 answers

How do you fine-tune an LLM to generate structured outputs like JSON or XML?

Can i know How do you fine-tune ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
142 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
311 views
0 votes
0 answers

What is a canary deployment in cloud environments?

Canary deployments involve rolling out changes to ...READ MORE

Jun 17 in Cloud Computing by Anupam
• 18,960 points
148 views
0 votes
0 answers

how to Implement LLM-based fraud detection in financial transactions.

Can i know how to Implement LLM-based ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
137 views
0 votes
0 answers

How to Implement BLIP-2 fine-tuning for caption generation.

With the help of code can you ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
142 views
0 votes
0 answers

How do you integrate dynamic attention pruning in transformers?

Can i know How do you integrate ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
142 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 308 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
306 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 306 views
0 votes
0 answers

How to implement Sparse Transformers for memory-efficient training.

With the help of proper code example ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
133 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
304 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities? [closed]

Behavioral analysis monitors application behavior during runtime, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 304 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
302 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

Jun 12 in SalesForce by Ashutosh
• 33,350 points
347 views
0 votes
0 answers

How do you train a custom WordPiece tokenizer for an AI model?

Can i know How do you train ...READ MORE

Jun 17 in Generative AI by Ashutosh
• 33,350 points
131 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 294 views
0 votes
0 answers

What are distributed systems in cloud computing, and how do they work?

Distributed systems coordinate multiple components across different ...READ MORE

Jun 16 in Cloud Computing by Anupam
• 18,960 points
174 views
0 votes
1 answer

Why is my Power BI custom visual (built with TypeScript) not rendering on the mobile app, even though it works on desktop?

To guarantee that your TypeScript-built Power BI ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
258 views