Search

Advanced Search

e-Services

Showing 76 to 80 of total 287 records

At present, State government receives  stamp duty through issuance  of stamp papers by Treasury (upto value of  10,000/-) and issuance of stamp duty receipt by various authorized branches of SBI (for value exceeding Rs. 10,000/-). The treasuries are required to maintain huge stock of...

Haryana has become first State/UT Government, to implement Digital Life Certificate (Jeevan Pramaan Patra)  for State Government  Pensioners, who are drawing their pensions from State Treasuries & Sub Treasuries. There are around 29000 pensioners and 110 Treasuries & sub-Treasuries...

NITI Ayog has taken an  initiative at Tigaon Village in district Faridabad of Haryana, where-in the newly born children are enrolled for UIDAI Aadhar at the time of  their Birth registration. This is first such pilot in the country , initiated by NITI Ayog. To carry forward this pilot initiative,...

  Honb’le Chief Minister, Haryana, Sh. Manohar Lal inaugurated the new integrated website of Urban Local Bodies, Haryana and online citizen services. The inauguration was done on 26.02.2015 at 11:00 AM at Haryana Niwas, Chandigarh during an interactive conference of Mayors, Sr. Deputy Mayors...

Consultative Workshop on Digitisation of Clearances for Setting Up Projects

Dr. Shubhag Chand, Delhi shubhag[at]nic[dot]in
  |   Nov 3, 2014

Project Monitoring Group and FICCI has organized a workshop on “Digitisation of Clearances for Setting Up Projects” on Friday 10th October, 2014 at Federation House, Tansen Marg, New Delhi.  Secretary in the Department of Industrial Policy and Promotion (DIPP) Mr. Amitabh Kant...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...