Search

Advanced Search

Articles

Showing 741 to 745 of 775 records

Anuppur: Serving Administration and People with ICT

SENDIL KUMAR
  |   October 2011

Situated in the north eastern part of Madhya Pradesh, Anuppur shares its geographical boundaries with Shahdol and Dindori districts of Madhya Pradesh and Bilaspur and Koria districts of Chattisgarh.The district was formed in the year 2003 and is popular among tourist for 'Amarkantak', the originating...

Secure Your Server Through SSL

SRINIVASA RAGHAVAN, SIVARAMA SELVAN
  |   October 2011

In the recent times, we have been using the Internet for many of our online transactions such as Online Ticket reservation, online banking etc.We also observe that at times the data / information are being hacked without the knowledge of the user. However, technology can be used to minimize the risk...

Multidimensional Data Modelling Concepts

KEZUNGULO MEDIKHRU, AJAY PK TATAPUDI
  |   October 2011

Multidimensional data modelling is used for the designing Data warehouse, which will help in surround facts with as much relevant context dimensions. Multidimensionality is a design technique that separates the relational data into facts and dimensions. Multidimensional model present information to the...

Contribution of NIC to Government of Bihar in the field of ICT

SANTOSH KUMAR, RAJIV RANJAN
  |   October 2011

National Informatics Centre has its wide presence in Bihar besides the 38 districts of the State.These centres have been instrumental in accelerating the pace of e-Governance with ICT-led initiatives and developments using the infrastructure of NIC e.g. NICNET, Data Centre, Video-Conferencing, etc. Regular...

Puducherry: Spreading ICT through the French Colonial Heritage

S RAJASEKARAN, S SIVANANDAM
  |   October 2011

The Union Territory of Puducherry is a unique place and it is a blend of spiritual aura, French colonial heritage,Tamil culture and the cosmopolitan flair of many nationalities in a small but varied town.The inherent ambiance of "Pondy", as it is fondly called, becomes most evident in the oldest...

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...