Search

Advanced Search

Articles

Showing 86 to 90 of 825 records

Two common protocols used in microservices are HTTP request/response with resource APIs and lightweight asynchronous messaging when communicating updates across several microservices. This way the small, lightweight modules in MSA architecture can achieve the business domain process. MSA is the established...

SugamyaWeb Enabling accessible web experience of the Indian Governments websites

Alka Misra, Durga Prasad Misra, Lokesh Joshi
  |   July 2023

SugamyaWeb is a cloud enabled Web Accessibility reporting platform, which provides end-to-end web testing. The tool classifies and prioritizes accessibility issues based on end user impact along with recommendations on how to fix the issue. So, as to enable the teams to target the right to fix, instead...

iHRMS Punjab Tool for Effective HR Management & Decision Support

Vivek Verma, Mukesh Kumar Ralli, Devi Singh Thakur
  |   July 2023

iHRMS Punjab is a unified HRM platform that encompasses all government entities in Punjab. It simplifies and standardizes HR processes from employee onboarding to offboarding, ensuring efficiency. With role-based workflows, it enables stakeholders to carry out tasks seamlessly. Over six years, Punjab...

GPCB-VLTS Hazardous Waste Real Time Vehicle Location Tracking System

Pramod Kumar Singh, Pankaj K. Pathak, Anil Kumar Arya, Ramakant Soni
  |   July 2023

GPCB-VLTS is a comprehensive web-based application for realtime tracking of the vehicle carrying the hazardous waste from industrial sites to waste management facilities for safe disposal of it.The application is developed by NIC Gujarat in collaboration with NIC Uttarakhand team. It provides a very...

ePrayuktiSewa Online Portal for Mobile App & Bharat Map Service

Kabita Roy Das, Hiranmayee Goswami, Ajit Bhattacharyya, Debojyoti Sarkar
  |   July 2023

e-PrayuktiSewa, created by NIC Assam, is a platform that helps government entities in Assam make better decisions, allocate resources wisely, and stay aware of their surroundings. It does this by offering tools like the Mobile App Builder, Bharat Map services, and AI algorithms, which allow government...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...