Search

Advanced Search

e-Services

Showing 206 to 210 of total 287 records

SMS BASED MONITORING SYSTEM FOR FAIR PRICE SHOPS IN TAMIL NADU

S. GAYATRI DEVI, S. VIDYASANKAR, S. MANIVASAGAN
  |   July 2014

The Co-operation, Food and Consumer Protection Department of the Government of Tamil Nadu has the operational responsibility of identification of beneficiaries, issuance of ration cards and supervision of movement and distribution of food grains from godowns through Fair Price Shops located all...

Due to ever increasing demand for skilled manpower, large scale establishment of the Industrial Training Institutes (ITIs) is taking place both in public as well as in private sectors. At the same time, there is a need to regularly monitor the infrastructure, results, faculty, trainees etc. of...

JAJPUR: An Emerging e-Governance Hub

SUDHANSU MOHAN SATPATHY, JYOTI PRAKASH BEHERA
  |   July 2014

Jajpur was founded by Jajati Keshari, the Somavanshi King in the early 10th Century. The district takes the name from its headquarter town, which is the main hub of activities. The history of the district from time immemorial is synonymous with the Biraja and Biraja Khetra. Be it in agriculture or...

The payment system is one of the most important elements of a financial system and Government always looks for innovative ways of making hassle-free payments to individuals. Since electronic means of payment are both safer and more efficient, efforts are being made continuously to effect a change...

PAKUR: Empowering Citizens through e-Governance

KISHORE PRASAD
  |   April 2014

Situated in the north-eastern corner, Pakur is one of the twenty four districts of the Jharkhand state and is topographically divided into three distinct regions - hilly, rolling and alluvial. The district is predominantly agricultural based and the main occupation of the people is cultivation....

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...