Search

Advanced Search

Standardization

Showing 6 to 10 of total 39 records

Workshop on eTaal and eGov App Store Held at SHIMLA, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Oct 12, 2015

A one day workshop on eTaal and eGovApp Store was held on 5th October 2015 at Shimla for the State Government and NIC Officers. Dr. Shefali S Dash, DDG NIC, Sh. IPS Sethi, Sr. TD and Mrs. Mala Mittal, Sr. TD visited Shimla and interacted with the participants on the eTaal and eGovApp Store. Sh. Sanjeev...

Meeting on Common Minimum Framework (CMF) held at DeitY (MCIT) on 16th & 17th December 2014

Mohan Das Viswam, NIC-HQ mohandas[at]nic[dot]in
  |   Dec 22, 2014

Common Minimum Framework (CMF) is a project under the “Digital India” envisaged to improve the quality of Government websites for better presentation and citizen centric features. This shall also necessarily move towards making these websites accessible to all. The project initially includes...

GIGW Workshop at NIC Delhi on 12 August 2013

Lokesh Joshi, Delhi lokesh[at]nic[dot]in
  |   Aug 13, 2013

NIC has developed “Guidelines for Indian Government websites” (GIGW) as an initiative under the National Portal of India Project. These guidelines aim at achieving the objective of making the Indian Government websites comply with the essential pre-requisites of UUU Trilogy i.e; Usable,...

CSI eNihilent Award of Excellence for Manav Sampada-An NIC Himachal Pradesh Initiative

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Dec 10, 2012

The Manav Sampda initiative, developed and implemented by NIC Himachal Pradesh State Centre as a complete Human Resource Management solution, has won the CSI eNihilent Award of Excellence under the G2E Project category. The Awards were presented in the recently held CSI Annual Convention at Kolkotta...

GIGW wins Award in ICT

Lokesh Joshi, Delhi lokesh[at]nic[dot]in
  |   Sep 21, 2012

  ‘Guidelines for Indian government websites’ received the gold award in the ‘ICT’ category and ‘central government’ sector at the Skoch Digital Inclusion Awards 2012. The award was presented to the group by Mr Salman Khurshid, Hon’ble Minister, Ministry...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...