Search

Advanced Search

Trainings

Showing 176 to 179 of total 179 records

Even in the face of multiple challenges, NIC-J&K has been providing excellent services to various Departments of the State Government by developing and deploying best practices, tools, techniques and processes in the field of ICT. NIC-J&K has become almost the sole destination for the Departments,...

Pali: ICT enabled Initiatives Leading to Good Governance

ANIL PUROHIT, KAPIL UJWAL
  |   April 2011

With a glorious historical background, Pali traces its origin to Mahabharata when as a part of ancient Arbuda province, it was known as Balla-Desh. Memoirs of legendary Chinese traveler Huen-t-Sang, mentions it to be a part of Gurjar Desh in 667AD. Before the formation of Rajasthan, Pali was...

SMS Application Development using Open Source

SRINIVASA SUBBA RAO, J.V. RADHAKRISHNA
  |   October 2010

SMS - Short Messaging Service has changed the life of the common man, leave alone the benefits of a mobile phone, in staying connected and doing transactions while on the move. SMS integration with e-Governance applications has taken a big leap in reaching the masses renaming SMS as Smart Management...

ICT Initiatives in HP Police

Ajay Singh Chahal
  |   January 2010

Sh. G S Gill, IPS & Director General, Himachal Pradesh Police speaks to Informatics on the various e-Governance Initiatives undertaken successfully in the HP Police Department.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...