Search

Advanced Search

Elections

Showing 21 to 25 of total 48 records

NIC-Haryana team developed a web based  application for the Municpal Corporations Election-2013 held in seven numbers of Municpal Corporations of Haryana in the month of June'2013. Web based application was developed by the NIC-District Unit, Hisar and hosted at NIC-Haryana State Center under...

Election Personnel Deployment System for Urban Local Bodies Election, Uttar Pradesh

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Sep 26, 2012

Uttar Pradesh is one of the largest states of the country and holding elections of Urban Local Bodies (ULB) in the state is a mammoth task with 728 seats (12 Nagar Nigam, 194 Nagar Palika & 422 Nagar Panchayat) in contention, around 35000 polling stations/booths and little more than 3 crore voters....

ICT support of NIC, Uttar Pradesh in election of Urban Local Bodies.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Sep 13, 2012

After 73rd and 74th Constitutional Amendments, the responsibility of conducting free & fair elections of Panchayats and Urban Local Bodies in the state has been vested in the State Election Commission under article 243K & 243ZA of the constitution of India. In Uttar Pradesh the State Election...

On the directions of Election Commission of India /  CEO Haryana, the  district Administration of Hisar and Fatehabad were asked to make arrangements for live Web casting from 02 polling booths each from 47-Adampur (District Hisar ) & 41-Ratia (District Fatehabad) Assembly Constituencies...

NIC-District Unit, Hisar was entrusted with the responsibility of computerization of various processes as mandatory part to conduct the Bye-Election-2011 (04-Hisar Parliamentary Constituency). NIC-Hisar extended not only the restless support to the District Administration but also innovated and added...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...