Search

Advanced Search

Articles

Showing 381 to 385 of 812 records

Telangana's Rashtriya Bal Swasthya Karyakram Software

DR. Y.S. MURTY, SRINIVASA SUBBA RAO AKELLA
  |   October 2016

This software captures various health conditions of children in the target age group. In cases where diseases are detected, or if medical intervention is required, support is provided free of cost and the parents of the affected children are informed through SMS automatically.

Automation Initiatives & Transparency in eGovernance of Bihar

Shri Rajesh Kumar Singh, Shri Rajiv Ranjan
  |   October 2016

Shri Anand Kishor, IAS, is serving the Government at various key positions in Bihar such as Divisional Commissioner- Patna, IG-Prison, Chairman- Bihar School Examination Board and Director- Khuda Baksh Oriental Public Library. He has been successfully transforming innovative ideas into reality in partnership...

The Secretary (MeitY)'s Visit to NIC

MOHAN DAS VISWAM
  |   October 2016

The first visit of Smt. Aruna Sundararajan, IAS, to National Informatics Centre (NIC) Headquarters on 5th of September 2016 after taking charge as the new Secretary to Ministry of Electronics & Information Technology (MeitY), marked a special day in the journey of NIC. On the occasion, the Secretary...

Monitoring of Handloom Schemes of Manipur using GIS

YENGKHOM JUNU SINGH, MAIBAM KUBIHEIBA MEITEI
  |   October 2016

GIS based applications are being used widely for analyzing and providing decision support for various activities. MOHSOM Software uses the technology to track the events and activities of the handloom schemes being implemented in a Cluster and thereby provide support in decision-making to the State Department

First Paperless Court of Judicature at Hyderabad

DR. A. RAMA MOHAN RAO, K. RAJASEKHAR, B. RAMCHANDER
  |   October 2016

The software can also record the dictation of the judgment into the computer which can be subsequently used by the Stenographer for transcription.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...