Search

Advanced Search

Technology

Showing 241 to 245 of total 262 records

Closed Circuit Surveillance System at Delhi Tihar Prisons

Rajiv Prakash Saxena
  |   January 2010

In major initiative to strengthen its security and surveillance on the activities of Prisoners in Delhi Tihar Prisons, the prison administration has geared up with the installation of Close Circuit Televisions (CCTV), covering major portions of the prison. With state of art CCTV control room being set...

ICT Initiatives in HP Police

Ajay Singh Chahal
  |   January 2010

Sh. G S Gill, IPS & Director General, Himachal Pradesh Police speaks to Informatics on the various e-Governance Initiatives undertaken successfully in the HP Police Department.

Cloud Computing: An Innovative Approach in IT

Sendil Kumar
  |   January 2010

With every day innovations in IT world, the way IT corporations and business organization benefitting from such innovations keeps growing. Cloud computing is a major shifting in the way IT organs in the organizations worldwide is going to look like and perform in the near future. It has already become...

Leveraging Web 2.0 in Government

Neeta Verma
  |   January 2010

A new genre of Web-based applications has gained a lot of popularity in last few years. Applications such as Facebook, YouTube, MySpace, Twitter, once a tool of tech savvy youngsters have gained a lot of popularity and acceptance across much wider spread of demography. Social-networking Web sites,...

Service Oriented Architecture: In the Security Perspective

Niladri Bihari Mohanty, Ravindra Kumar Jaiswal
  |   January 2010

As electricity, if used tactfully then many useful things can be done but a little carelessness can make a big loss. As the same way Information, if accessed by the authorized person, produces effective output but unauthorized access to the same may create unpredictable nuisance. Many e-Governance...

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...