Search

Advanced Search

Awards

Showing 71 to 75 of total 211 records

Online Drug Inventory & Supply Chain Management System - Skoch Order-of-Merit Award - 2016

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Sep 20, 2016

Integrated workflow from  P.O. preparation ,  vendor supply, receipt by warehouse, Sample Lifting , inspection note, verification, lab testing, Indent  by institute, issue and Receipt, consumption at Institute. Demand and consumption analysis, KPIs & MIS.  Replicated in Karnataka...

National Informatics Centre has been awarded the 7th NCPEDP - Mphasis Universal Design Awards 2016 under Companies/Organizations Category for formulating Guidelines for Indian Government Websites (GIGW)   [Website:  http://guidelines.gov.in]. GIGW aims to ensure that people with disabilities...

Hon’ble Prime Minister Shri Narendra Modi launched the “Gramoday Se Bharat Uday Abhiyaan” on 14-04-2016.  On the eve of National Panchayati raj Day, Hinjilicut block of Ganjam district, Odisha adjudged as the best block in the entire country under the Gramoday Se Bharat Uday...

NIC District Unit, Subarnapur with its state-of art infrastructure, is rendering its service of excellence since the inception of the district in the year 1993 with the objec tive to facilitate e-Government / e-Governance applications in the district. Apart from all state and national level applications,...

Two NIC, Himachal Pradesh Projects Conferred PC Quest Best IT Implementation Awards 2016

Sandeep Sood, Himachal Pradesh sood[dot]sandeep[at]nic[dot]in
  |   Mar 17, 2016

Thirteenth CIO Leadership Forum was organized by Cyber Media (India) Ltd. from 11th March to 13th March, 2016. During the event two projects developed by NIC District Centre Mandi and Hamirpur in Himachal Pradesh were awarded “PC Quest Best IT Implementation Award”.  Both the projects...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...