Search

Advanced Search

Technology

Showing 186 to 190 of total 262 records

APPBUILDER:A Tool & A Framework

DEEPAK GOSWAMI
  |   April 2014

Software developers quite often come across situations where fast prototyping of a software becomes absolutely essential. Most of these software are database-centric and CRUD (create, retrieve, update, delete) functionalities form about 30%-40% of the total development effort (if not more)....

National Cloud Services of NIC

VIJAY KUMAR VISHWAKARMA, ANUPAM JOHRI, HEMANT CHOPRA
  |   April 2014

With the emergence of Cloud computing and its power to foster efficiency in Governance, there has been a paradigm shift in the setting up and management of ICT services in Indian Government. Through Cloud services, the provision of ICT infrastructure to various departments and organizations of...

One of the major challenges which IT systems face today is System Availability. Availability is critical in terms of components viz., Web Server, Database Server, and Network. Without availability, services fail, SLAs exceed, revenue is lost and finally a bad publicity can leave a lasting effect...

LINKED DATA: Road to Intelligent Web

SAVITA BHATNAGAR
  |   January 2014

Linked data is emerging as a new paradigm for publishing and interlinking data from different data sources and evolving web from Web of linked documents into the Web of linked data. The global database created by linked data provides flexible interorganizational collaboration and dynamic...

POWERING GIGW COMPLIANCE

Alka Mishra, Lokesh Joshi
  |   January 2014

In the last decade or so, India has metaphorically witnessed a lot of water surge & not just meekly flow under the bridge. Technology has played an increasingly prominent role as enabler and leveller. Enabler- Technology continues to bring a flood of opportunities to lead lives very differently...

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...