Search

Advanced Search

Technology

Showing 26 to 30 of total 278 records

eSamikSha, an online Monitoring and Compliance Mechanism has been developed by Cabinet Secretariat Informatics Division, to fast track the compliance of pending action points, proposal, targets, etc. of Various Ministry/Department/Organization/Agency of Govt. of India and Government of States and...

Shri Anil Madhav Dave, Minister of State (Independent Charge) of Environment, Forest and Climate Change (MoEF&CC), launched the CPCB-eSamikSha Portal on 23rd November, 2016 in the 61st Conference of Chairmen & Member Secretaries of Pollution Control Boards and Pollution Control Committees...

Mobile App Launched at Indira Gandhi Krishi Vishwavidyalaya, Raipur, Chhattisgarh

Y. V. Shreenivas Rao, Chattisgarh yvsrao[at]nic[dot]in
  |   Feb 29, 2016

On the 20th Jan’2016,  the 30th foundation day  of the Indira Gandhi Krishi Vishwavidyalaya (IGKV), Raipur the National Workshop on “Concepts of Higher Education and its Future Nature” was organized. On this occasion the university moved one step ahead towards ICT penetration...

Department of Science and Technology

Lokesh Joshi, lokesh[at]nic[dot]in
  |   Feb 11, 2016

The Department of Science & Technology plays a pivotal role in promotion of science & technology in the country. The department has wide ranging activities from promoting high end basic research and development of cutting edge technologies on one hand to provide service to the technological...

Ministry of Youth Affairs and Sports

Lokesh Joshi, lokesh[at]nic[dot]in
  |   Feb 11, 2016

The Ministry of Youth Affairs & Sports was initially set up as the Department of Sports in 1982 at the time of organization of the IX Asian Games in New Delhi. Its name was changed to the Department of Youth affairs & sports during celebration of the International Youth Year, 1985. It became...

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...