Search

Advanced Search

ICT Initiatives

Showing 161 to 165 of total 278 records

eIndia Governance Award for EASYGAS Initiative of NIC, Gonda, U.P.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Sep 10, 2013

The EASYGAS (Online LPG Booking System) initiative on district Gonda, Uttar Pradesh won the Jury Choice Award under the ‘CSC Initiative’ category of eIndia eGovernance Awards 2013. The award was handed over to project team during the recently held eIndia eGovernance Summit 2013 at Hyderabad...

Odisha Forest Development Corporation (OFDC), Govt. of Odisha, is responsible for  Trade of salvage timber / firewood, processed and phal Kendu leaves, Collection and trade of Salseed, Trade of cashew nut and rubber harvested through plantation, Collection, Processing and trade of Honey and Non...

NIC-Haryana team developed a web based  application for the Municpal Corporations Election-2013 held in seven numbers of Municpal Corporations of Haryana in the month of June'2013. Web based application was developed by the NIC-District Unit, Hisar and hosted at NIC-Haryana State Center under...

 It has been almost a year and 852 datasets and counting.  Data Portal India (http://data.gov.in), an Indian Government Open data initiative has come a long way, it all started with GOI announcing the NDSAP (http://data.gov.in/sites/default/files/NDSAP.pdf) and National Informatics Centre,...

Launching of IVFRT system for Districts of Tamilnadu at Coimbatore on 22/04/2013

R.Gayatri, Tamil Nadu r[dot]gayatri[at]nic[dot]in
  |   May 1, 2013

Immigration, Visa, Foreigners registration and Tracking (IVFRT) system was launched for Tamil nadu districts at Coimbatore on 22/04/2013. It is a Mission mode National e-Governance project of Govt. of India to provide the high standard of integrated Visa and Immigration services for the visiting foreigners...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...