Trending questions in Edureka Community

0 votes
1 answer

How to cast a date slicer’s selection to filter another unrelated table in Power BI?

In Power BI, you can apply a ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
16 views
0 votes
1 answer

How to rank and sort Power BI card visuals by measure values or rank?

To dynamically rank and sort Power BI ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
16 views
0 votes
1 answer

How to dynamically determine and display financial quarter start/end dates on a Power BI chart axis?

To dynamically display financial quarter start and ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
16 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
15 views
0 votes
1 answer

What’s the easiest way to add dynamic filters or parameters to a Paginated Report?

Using Report Parameters is the simplest method ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
14 views
0 votes
1 answer

How can I include images and branding in Paginated Reports?

The following techniques can be used to ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
13 views
0 votes
1 answer

What licensing is required to deploy paginated reports in Power BI Service?

Generally, a Power BI Premium license is ...READ MORE

1 day ago in Power BI by anonymous
• 32,290 points
13 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
21 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
21 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
19 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
19 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
17 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
16 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management?

How can quantitative risk models help in ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
15 views
0 votes
0 answers

How does AI-driven attack simulation test network security?

How does AI simulate potential attack strategies ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
15 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
15 views
0 votes
0 answers

Which methods can be used to handle zero-day vulnerabilities?

What strategies can be used to address ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
13 views
0 votes
0 answers

How do honeytokens help detect enumeration attempts?

How do honeytokens, which are fake data ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
13 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
13 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
13 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities?

How can monitoring an application's behavior during ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
13 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points

closed 1 day ago by Anupam 13 views
0 votes
0 answers

Which cryptanalysis tools are used in penetration testing?

What cryptanalysis tools, like John the Ripper ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
12 views
0 votes
0 answers

How do ciphers work in data encryption?

How do ciphers use algorithms and encryption ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
12 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
12 views
0 votes
0 answers

How does Bayesian analysis help in vulnerability risk scoring?

How does Bayesian analysis update the risk ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points
12 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
11 views
0 votes
0 answers

How do deep learning models enhance IDS evasion detection?

How can deep learning models improve intrusion ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Nidhi
• 16,140 points
10 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points

closed 1 day ago by Anupam 10 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities? [closed]

Behavioral analysis monitors application behavior during runtime, ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points

closed 1 day ago by Anupam 10 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 17,800 points

closed 1 day ago by Anupam 10 views
0 votes
0 answers

Write a script to integrate LangChain’s VectorDB Retriever with FAISS/HNSW.

Can you let me know Write a ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
27 views
0 votes
0 answers

Write a custom Hugging Face dataset loader for fine-tuning on a JSONL dataset.

Can i know Write a custom Hugging ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
27 views
0 votes
0 answers

How do you modify a BART tokenizer to handle custom special tokens?

Can you tell me How do you ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
24 views
0 votes
0 answers

How to implement a real-time embedding refresh mechanism for a semantic search pipeline.

Can i know How to implement a ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
23 views
0 votes
1 answer

Is there any advantage in writing calculated columns in Power Pivot instead of in Power Query?

When performance is a concern with larger ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
29 views
0 votes
1 answer

How do I create multi-page printable reports from a Power BI dataset?

Creating multi-page, printable reports from a Power ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
28 views
0 votes
1 answer

Can I reuse my Power BI semantic model (dataset) in Paginated Reports?

It is possible to reuse your Power ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
27 views
0 votes
0 answers

How do you implement multi-turn conversation fine-tuning using SFT with ChatML formatting?

With the help of proper examples of ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
19 views
0 votes
1 answer

How do row-level security (RLS) settings interact with the Power Pivot model?

Row-Level Security (RLS) in Power BI provides ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
27 views
0 votes
0 answers

how do i troubleshoot issues with duplicate rule matching in salesforce?

Can i know how do i troubleshoot ...READ MORE

2 days ago in SalesForce by Ashutosh
• 31,930 points
19 views
0 votes
1 answer

When should I use Paginated Reports over standard Power BI reports?

In certain situations where standard Power BI ...READ MORE

3 days ago in Power BI by anonymous
• 32,290 points
24 views
0 votes
0 answers

How does bidirectional attention fusion improve sequence understanding in transformers?

May i know How does bidirectional attention ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
23 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

2 days ago in SalesForce by Ashutosh
• 31,930 points
18 views
0 votes
0 answers

Write a script to log perplexity metrics while training a decoder-only transformer.

Can you tell me Write a script ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
14 views
0 votes
0 answers

How does on-demand weight loading optimize GPU VRAM for LLM hosting?

With the help of proper code example ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
13 views
0 votes
0 answers

How do you optimize Faiss/HNSW index refresh in real-time RAG applications?

Can i know with the help of ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
13 views
0 votes
0 answers

How do you use Bootstrap Your Own Latent (BYOL) for self-supervised multimodal learning?

With the help of code may i ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
19 views
0 votes
0 answers

How do you apply QLoRA to reduce LLM memory footprint without degrading performance?

Can you tell me How do you ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
19 views
0 votes
0 answers

How do you optimize distributed inference using DeepSpeed and vLLM?

Can you tell me with the help ...READ MORE

2 days ago in Generative AI by Ashutosh
• 31,930 points
18 views
OSZAR »