Search

Advanced Search

Articles

Showing 26 to 30 of 812 records

Sanstha Aadhaar Streamlining Institutional Registration and Monitoring

Jitendra Kumar Verma, Amit Agarwal
  |   July 2024

Sanstha Aadhaar integrates Sanstha Aadhaar Numbers across Rajasthan to monitor economic activities, supporting Economic Census and NSSO Surveys for informed policy- making. It ensures transparency and efficiency through online registration, certification issuance, and integration with state...

MP State PM Poshan Shakti Nirman Portal enhances the Pradhan Mantri Poshan Shakti Nirman scheme by automating food grain provisioning, ensuring transparency with Aadhaar-enabled authentication, and facilitating timely digital payments. This digital platform streamlines operations to deliver...

NextGen DISE NextGen District Information System for Elections

Vivek Verma, Usha Rai, Dinesh Sharma
  |   July 2024

NextGen DISE developed by NIC Punjab comprises of Polling Personnel Management System (PPMS), Poll Activity Monitoring System (PAMS) and Queue Information System (QIS). PPMS is a web-based software for data digitization, data import and random deployment of Polling Staff,...

DAMPS Enabling Ex-gratia assistance faster, transparent and accountable

Ajit Kumar Panda, Mamata Khamari, Lalatendu Dash
  |   July 2024

DAMPS is a comprehensive system integrating G2C and G2G services via GIS maps and realtime systems. It ensures prompt ex-gratia assistance to disaster victims next of kin, enhancing service quality for Disaster Management Authorities. Currently operational across Odisha, it serves the Office...

How NIC State Centres Powered India 2024 Elections

Informatics News Desk
  |   July 2024

In India vibrant democracy, the 2024 General Elections were a massive undertaking. Behind the scenes, NIC played a vital role, serving as the technological backbone to ensure the process was smooth, transparent, and efficient. Collaborating closely with the Election Commission of India (ECI), NIC State and...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...