Search

Advanced Search

Technology

Showing 131 to 135 of total 285 records

Modern day G2C services expect very high concurrency in production. In order to ensure that the quality of service matches the expectations of end user, it is vital to perform a thorough load testing of application prior to its release. Load testing of such application requires considerable investment...

Digidhan Dashboard - Dashboard for monitoring Digital Payments

MOHAN DAS VISWAM
  |   October 2020

Digidhan Dashboard enables accurate reporting, monitoring, and analysis of various modes of digital payments and transactions across the country. It provides a consolidated view of 16 digital payment modes such as Unified Payment Interface (UPI), Immediate Payment Service (IMPS), Debit...

Since inception in 2009, more than 100 departments have been using OJAS platform for their recruitments of various class I, II & III posts. Over 2000 exams have already been conducted using the portal. In 2014, the system was made compulsory by the Government of Gujarat for any type of recruitment....

Remedies for cyber security challenges cannot be uncertain as they pose a serious threat in all sectors such as governance, health care, finance, and transport. Just as the corona virus can be kept away by simple steps like social distancing and the use of masks and sanitizers, cyber...

The EODB platform (https:// eodb.assam.gov.in) was developed using the Open, Secure and Scalable Framework ServicePlus, to facilitate for filing, management, and tracking of all necessary clearances, approvals, registrations, and renewals under various State enactments. The Single Window...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...