Search

Advanced Search

ICT Initiatives

Showing 146 to 150 of total 278 records

eVidhan Project Launched by Honourable Chief Minister, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Aug 12, 2014

The eVidhan project was formally inaugurated by the Honourable Chief Minister of Himachal Pradesh, Sh. Virbhadra Singh on 4th August 2014. A number of Ministers and Members of the Assembly including, Sh. Kaul Singh Thakur, Minister for Revenue, Health & Family Welfare, Sh. Mukesh Agnihotri, Minister...

Mr. N. Rangasamy, Chief Minister, Puducherry launched the State Level web portal ‘Online Projects Management System’ for Puducherry on Friday, 11th July 2014, at Chief Secretariat after Jharkhand, Odisha, Uttarakhand, Kerala, Chhattisgarh, Uttar Pradesh, Himachal Pradesh, Karnataka, and...

Mr. Anthony DeSa, Chief Secretary, Govt. of Madhya Pradesh launched the State Level web portal ‘Online Projects Management System’ for Madhya Pradesh on Thursday, 17th July 2014, at State IT Centre after Jharkhand, Odisha, Uttarakhand, Kerala, Chhattisgarh, Uttar Pradesh, Himachal Pradesh,...

Dr. Varesh Sinha, Chief Secretary, Govt. of Gujarat launched the State Level web portal ‘Online Projects Management System’ for Gujarat on 21st July 2014, at Chief Secretary Conference Room after Jharkhand, Odisha, Uttarakhand, Kerala, Chhattisgarh, Uttar Pradesh, Himachal Pradesh, Karnataka,...

 Anil Swarup, Additional Secretary and Chairman of the Project Monitoring Group, Cabinet Secretariat, Govt. of India launched the State Level web portal ‘Online Projects Management System’ for Andhra Pradesh on 25th July 2014, at Hyderabad after Jharkhand, Odisha, Uttarakhand, Kerala,...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...