Search

Advanced Search

Technology

Showing 206 to 210 of total 262 records

Strengthening and enhancing the security posture of systems and services is one of the objectives of any organization dealing with information assets of different organizations and departments of Government of India. The Cyber Security Division of NIC is dedicated to this task, having adopted a multi-pronged...

DISSECTING A MALWARE ATTACK

RAJ K. RAINA
  |   October 2012

A malware can sneak into a system in the guise of a mail attachment or the system can get infected by simply visiting a malicious website. User is often taken off-guard while the malware sneaks into the system and compromises its integrity.

NoSQL- NO PROBLEM WITH 'BIG DATA'

A.K. HOTA And D. MADAN PRABHU
  |   October 2012

Tabular data remains tabular and the spreadsheet is still a business's favourite data modeling tool. SQL is not going away anytime soon. However until now we've been creative in working with and around the constraints of a typical relational datastore. NoSQL offers the chance to think differently...

e-Office: COLLABORATION AND MESSAGING SERVICE

YERUR SIRAJ AHMED
  |   October 2012

eOffice-CAMS is focused on providing effective communication between departmental applications through collaboration and the obvious solution is to have Collaborative service. The idea is to facilitate action oriented team to work together over a geographical distance and let internal users, systems...

WEB PAGES WITH RAZOR SCRIPTING NEW VIEW ENGINE IN ASP.NET

SANJAY GUPTA
  |   October 2012

Razor syntax is based on technology from Microsoft called ASP.NET, which in turn is based on Microsoft .NET Framework. The Razor syntax gives you all power of ASP.NET, but using a simplified syntax that's easier to learn and it can be used with existing ASP.NET Web Site.

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...