Search

Advanced Search

Articles

Showing 701 to 705 of 775 records

NoSQL- NO PROBLEM WITH 'BIG DATA'

A.K. HOTA And D. MADAN PRABHU
  |   October 2012

Tabular data remains tabular and the spreadsheet is still a business's favourite data modeling tool. SQL is not going away anytime soon. However until now we've been creative in working with and around the constraints of a typical relational datastore. NoSQL offers the chance to think differently...

DISSECTING A MALWARE ATTACK

RAJ K. RAINA
  |   October 2012

A malware can sneak into a system in the guise of a mail attachment or the system can get infected by simply visiting a malicious website. User is often taken off-guard while the malware sneaks into the system and compromises its integrity.

Strengthening and enhancing the security posture of systems and services is one of the objectives of any organization dealing with information assets of different organizations and departments of Government of India. The Cyber Security Division of NIC is dedicated to this task, having adopted a multi-pronged...

PUNJAB - ESTABLISHING TRANSPARENT AND ACCOUNTABLE GOVERNANCE

NAVNEET KUKREJA And VIKRAM JEET GROVER
  |   October 2012

Punjab has maintained its growth momentum because of a number of policy measures by the state government, implementation of several vital projects and most importantly never-say-die attitude of Punjabis. ICT projects have been a significant contributor in improving citizen government interactions, modernization,...

ASSAM - IMPLEMENTING INNOVATIVE ICT PROJECTS

DEEPAK GOSWAMI And TASIRUDDIN AHMED
  |   October 2012

NIC Assam State Centre is equipped with state of the art Network Operation Centre and a Data Centre at New Sachivalaya Complex in Dispur. The official website of the government of Assam is a rich source of information and highlights many e-governance activities of the state. The Assam Online portal...

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...