Search

Advanced Search

Articles

Showing 751 to 755 of 812 records

Gadchiroli: Embracing ICT in the Tribal District

S.R TEMBHURNE & SAYYED YASIN USMANSAB
  |   July 2011

Situated in the southeastern corner of Maharashtra, Gadchiroli is categorised as a tribal and undeveloped district with more than 80% of its land covered with dense forest and hills. Information Technology has paved the way to development and good governance in this economically and industrially...

Mobile e-Governance Services

VS RAGHUNATHAN & R RAMESH
  |   July 2011

Mobile e-Governance services is an integration technology. It best demonstrates its value when integrating heterogeneous systems because it supports many kinds of programming languages, run times, and networks. When there is a need to connect applications from incompatible environments, the...

Cufon: Custom Font Embedding Technique for Web

MOHAN DAS
  |   July 2011

Cufon, pronounced as Koofo, is one among the popular font replacement techniques of its kind, which has attained much attention and popularity among web developers. Thanks to Simo Kinnuenen, a Finland-based web guru who developed this technique, which has evolved and enabled us to use non-web,...

Colorful Rajasthan is a fairy tale of majestic palaces, fortresses, cities, and buzzing bazaars with the confluence of history, chivalry, romance, rugged natural beauty, art, crafts and culture. With the rich historical and cultural background NIC in the state had taken off in 1988 has started...

Nagaland - Towards Digitally Vibrant and Responsive Governance

KEZUNGULO MEDIKHRU & T.Y. SANGTAM
  |   July 2011

Nagaland is largely mountainous with hilly topography throughout and the highest peak being Saramati (3841 metres). Many rivers cut through the mountainous terrain, like sharp swords slicing through rocks. Nagaland being a land of myths and festivals, has been officially named as 'Land...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...