Search

Advanced Search

Digitization

Showing 81 to 85 of total 234 records

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware Security Modules (HSMs), and implementing software-based HSMs on dedicated servers and isolated VLANs. It assesses each method security, cost- effectiveness, and practicality. While...

Unified Data Hub Empowering Proactive Governance through Integrated Solutions

V. Gopi Swaminathan, S. Arulraj, Sheik Rasheed
  |   January 2024

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses Puducherry residents and their enrolled schemes, incorporating 24 departments and 150 central and state schemes. Its scalability allows seamless integration with new schemes. The...

Since its inception, NIC Khowai District Centre has been a crucial force in providing technical support and fostering skill development among diverse stakeholders. Leveraging its ICT expertise, NIC Khowai efficiently implements numerous National and State-level ICT projects with transparency. The centre...

iHRMS Punjab Tool for Effective HR Management & Decision Support

Vivek Verma, Mukesh Kumar Ralli, Devi Singh Thakur
  |   July 2023

iHRMS Punjab is a unified HRM platform that encompasses all government entities in Punjab. It simplifies and standardizes HR processes from employee onboarding to offboarding, ensuring efficiency. With role-based workflows, it enables stakeholders to carry out tasks seamlessly. Over six years, Punjab...

Two common protocols used in microservices are HTTP request/response with resource APIs and lightweight asynchronous messaging when communicating updates across several microservices. This way the small, lightweight modules in MSA architecture can achieve the business domain process. MSA is the established...

Recent Issues

Highlights

Jul. ' 25 Issue


GetOTP A Smart Companion for Reliable OTP Delivery

GetOTP is a smart Android app that delivers OTPs via the internet, bypassing unreliable SMS channels. It ensures fast, secure, cost free ...


Beyond the Audit ISO 27001 as the Backbone of Trusted Digital Infrastructure

Indias expanding digital governance needs more than routine audits, which often miss infrastructure gaps, weak access controls, and ...


Cyber Hygiene at Scale: Securing Government LAN and Endpoints using MOGLES & CAAR

To address the complex cybersecurity needs of government infrastructure, a custom framework Model of Government LAN & Endpoint Security (MOGLES) ...

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...