Search

Advanced Search

Workshops

Showing 151 to 155 of total 244 records

IVFRT Thiruvananthapuram Workshop on C-Form Online Submission for Hoteliers at Varkala

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Sep 12, 2013

A workshop on C-Form Online Submission under IVFRT-MMP was organized by FRRO Thiruvanathapuram at Govt. Guest House, Varkala on 11th September 2013. The participants included hoteliers, home stay providers, authorised spas and ayurvedic centre owners. Sh. K. K. Jayamohan, FRRO Thiruvananthapuram...

C-FORM Workshop under IVFRT-MMP Organized at Mumbai, Maharashtra

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Sep 2, 2013

A Workshop on C-FORM module under IVFRT-MMP for hoteliers was organized by Hotel & Restaurant Association (Western India) at Pritam Hotel, Dadar, Mumbai on 06-Aug-2013 in coordination with FRRO, Mumbai and NIC Mumbai. Sh. Chetan Mehta, Member, Hotel & Restaurant Association (Western India)...

One day state level workshop cum training programme on HORTNET Software Application was organized on 29-07-2013 at Directorate of Horticulture, Sector-21, Panchkula, Haryana. The key note address was delivered by Dr.Arjun Singh Saini, Addl. Director SHM Haryana.  Smt. Jyoti Singhal, Under Secretary,...

GIGW Workshop at NIC Delhi on 12 August 2013

Lokesh Joshi, Delhi lokesh[at]nic[dot]in
  |   Aug 13, 2013

NIC has developed “Guidelines for Indian Government websites” (GIGW) as an initiative under the National Portal of India Project. These guidelines aim at achieving the objective of making the Indian Government websites comply with the essential pre-requisites of UUU Trilogy i.e; Usable,...

The Workshop-cum-Training programme was organised jointly by NIC Hassan district centre and SP Office, SB Branch under the guidance of Sh. Chandrasekar S. P, Senior Technical Director, NIC-KSU, Bangalore and IVFRT Project State Coordinator to implement C-Form, S-Form and C-FRO Modules under IVFRT-MMP...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...