Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

We’re trying to get Jira tasks synced ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
49 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,340 points
42 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,340 points
40 views
0 votes
0 answers

What’s the best way to track scope creep metrics using Tableau or QlikView?

Scope creep is always tough to catch ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
46 views
0 votes
0 answers

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Has anyone used Otter.ai to automate speech-to-text ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
46 views
0 votes
0 answers

How do you integrate Miro Boards with Jira for backlog refinement?

We use Miro for ideation and Jira ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
46 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
70 views
0 votes
0 answers
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,050 points
39 views
0 votes
0 answers

What’s the best way to track sprint velocity trends using Domo?

We’re using Domo and want to monitor ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
45 views
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,050 points
37 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,340 points
36 views
0 votes
0 answers

How do you set up webhooks in Asana for automated task updates?

I’d like to automate task updates in ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
40 views
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
42 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,050 points
33 views
0 votes
0 answers

How do you set up custom report automation in Smartsheet Control Center?

I’ve just started exploring Smartsheet Control Center ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
39 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,050 points
33 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,050 points
30 views
0 votes
0 answers

What is the CVSS base score, and how is it calculated?

The CVSS base score measures the severity ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
40 views
0 votes
0 answers

How do you configure KPI dashboards in Power BI for Project Management?

I’m setting up KPI dashboards in Power ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
34 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
34 views
0 votes
1 answer

What are the key features of OpenVAS vulnerability scanning?

OpenVAS (Open Vulnerability Assessment System) is an ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
168 views
+1 vote
3 answers

How to auto build a job in jenkins if there is any change in code on Github repository?

To automatically run build on code commit, follow ...READ MORE

Jul 31, 2019 in Jenkins by Sirajul
• 59,230 points
79,947 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
52 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,340 points
35 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
45 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
157 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
119 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
113 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
112 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
61 views
0 votes
1 answer
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16 in Generative AI by simran
65 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
80 views
0 votes
1 answer

How to create a pipe that converts timestamps to relative time strings (e.g., '2 hours ago')?

You can use the date-fns library for ...READ MORE

Apr 10 in Angular by anonymous
125 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
88 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
130 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
64 views
0 votes
1 answer
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,050 points
79 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
99 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,050 points
78 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
62 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
102 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
58 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,050 points
73 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,050 points
65 views
0 votes
1 answer

How would you perform rank tuning in QLoRA for a large language model?

You can perform rank tuning in QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,050 points
64 views
0 votes
1 answer

How to implement a pipe that capitalizes the first letter of each word in a string?

To create a pipe in Angular that ...READ MORE

Apr 10 in Angular by anonymous
83 views