Search

Advanced Search

e-Services

Showing 1 to 5 of total 287 records

Workshop on NextGen eHospital in State of Jharkhand organised by NIC and ABDM, Jharkhand

Rajiv Kumar Sinha, Jharkhand rk[dot]sinha[at]nic[dot]in
  |   Feb 11, 2025

A one day workshop was organised on 11th Feb’2025 in Jharkhand by NIC and ABDM Jharkhand on Nextgen eHospital.  The workshop was chaired by Shri Shubhendu Kumar, Deputy Director General & HOG, eHospital NIC HQ and attended by State Mission Director, ABDM, Jharkhand, Shri Ravindra Kumar,...

Hon'ble Governor released the Annual Book "The Digital Pathway" of NIC, Odisha

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Aug 28, 2024

Hon'ble Governor, Odisha, Shri Raghubar Das released the Annual Book 2023-24 of National Informatics Centre (NIC), Odisha “Digital Pathway – Enabling eGovernance Platforms” on 23rd July 2024, in a function organised for the purpose at Raj Bhawan, Odisha. Dr. Ashok Kumar Hota,...

Launch of ePrayuktiSewa Portal by Chief Secretary, Assam on 31-05-2023

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Jun 2, 2023

e-PrayuktiSewa Portal developed by NIC Assam has been soft-launched in a small function by Shri Paban Kumar  Borthakur, IAS, Chief Secretary, Assam on 31-05-2023 in his office chamber. Smt. Kabita Roy Das, Deputy  Director General and State Informatics Officer, NIC Assam, gave a brief overview...

Launch of e-Khajana system in Assam for areas under Mouzadar

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Apr 25, 2023

Guwahati, April 1, 2023: Honorable Minister of Revenue and Disaster Management of Assam Mr. Jogen Mohan launched the e-Khajana system in the mouzadari areas of the state.  The ceremony was attended by Mr. Urkhao Gwra Brahma, Minister of Handloom & Textile, Sericulture, Bodoland Welfare and...

The Punjab government led by Chief Minister S. Bhagwant Singh Mann organised 'NRI Punjabian Nal Milni' in the month of December, 2022 at 5 venues across State of Punjab to resolve the grievances and problems of Punjabis residing abroad.   Department of NRI matters, Govt of Punjab...

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...