Search

Advanced Search

Articles

Showing 66 to 70 of 812 records

Ranchi, Jharkhand Pioneering ICT and e-Governance for a Digital Jharkhand

Shiv Charan Banerjee, Rajeev Ranjan, Reema Kujur
  |   October 2023

NIC Ranchi has championed the emerging technologies, successfully implementing various projects for all three: Central Government, State Government, and District Administration. Notable achievements include integration of VR Smart Class, development of m-Karmik mobile app, and implementation of District...

NIC Mahbubnagar has been a cornerstone of technical support and skill development among diverse stakeholders. With strong ICT expertise, it efficiently executes several national and state-level ICT projects, ensuring transparency. The centre has successfully raised awareness about the significance of...

Since its inception, NIC Khowai District Centre has been a crucial force in providing technical support and fostering skill development among diverse stakeholders. Leveraging its ICT expertise, NIC Khowai efficiently implements numerous National and State-level ICT projects with transparency. The centre...

Recognized for its pioneering work in Digital Governance, NIC Kaithal has established itself as a leading ICT service provider for District Administration stakeholders, enhancing transparency and streamlining citizen service delivery. Further, NIC Kaithal is at the forefront of harnessing emerging technologies...

Sikkim Supporting the government through ICT

Dr. L. P. Sharma, D. K. Basnet, Sabita Choudhary, Kuldeep
  |   October 2023

NIC Sikkim State Centre has been making significant strides in providing a wide array of ICT-based solutions to enhance citizen service delivery within the state. These solutions not only promote convenience and transparency but also play a pivotal role in the government efforts to uplift the disadvantaged...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...