Search

Advanced Search

Trainings

Showing 76 to 80 of total 180 records

SWACHH BHARAT MISSION-MIS APPLICATION WORKSHOP/TRAINING PROGRAM HELD IN NAGALAND

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   Feb 9, 2016

The one day Swachh Bharat Mission (SBM) MIS Application workshop cum training program was held at VC Conference hall in the New Secretariat Complex where Smt. Ahola Those, Secretary Urban Development Department, Govt. of Nagaland was invited as Chief Guest. The meeting was chaired by Shri Kezungulo...

Workshop on State Projects Management Portal conducted at Delhi, on 12th and 13th Oct 2015

Dr. Shubhag Chand, Delhi shubhag[at]nic[dot]in
  |   Nov 2, 2015

“ePMS, an On-line Project Management System for Delhi tracks the projects involving investment 1 crore to 1000 crore. It enhances the efficiency, bring transparency and improve the communication between industries to Government and State to Centre or vice versa. It automates the entire tracking...

Nagaland - TrackChild 2.0 Portal training conducted for CCIs

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   Oct 1, 2015

Two days State Level Training for Child Care institutions (CCIs) Nagaland on usage of Trackchild portal was held on 29th and 30th September 2015 at Zonal Council Hall Kohima organized by the State Child Protection Society Nagaland. Participants from 58 Child Care Institutions(CCIs) attended the training...

AEBAS Training Camp Held at the Directorate of Fisheries, Bilaspur, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Sep 17, 2015

A one day training on Aadhaar Enabled Biometric Attendance System was organised by NIC Himachal Pradesh in the Directorate of Fisheries, at Bilaspur  on 11th September 2015 for smooth roll-out of the AEBAS in all the District and Division level offices of the Fisheries Department. About 25...

NIC Maharashtra State Centre conducted Training Programme on Web Services for State and Central Government Departments a part of the Digital India programme and as per the NIC Mumbai  Training Calendar 2015-16.. This  training programme was conducted to familiarize the participants...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...