Search

Advanced Search

ICT in States

Showing 11 to 15 of total 370 records

HoG, National e-Vidhan Application (NeVA) Reviewed the implementation status in Odisha

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Mar 22, 2024

Shri Rajiv Rathi, Deputy Director General and HoG (NeVA), NIC, New Delhi visited Odisha Legislative Assembly (OLA) on 20th March to review the progress of NeVA implementation in Odisha. Shri Rathi visited the Digital House, Neva Cell and Neva Seva Kendra of the OLA and assessed the progress of...

State Level Workshop on eDAR application was organised in Odisha

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Dec 19, 2023

eDAR(Electronic Detailed Accident Report) is an extension of iRAD (Integrated Road Accident Database) and can process the Accident claims of the victims in a transparent and hassle free manner by the different stakeholders for Motor Accident Compensation Claim. To kick-off the implementation of e-DAR,...

Odisha Disaster Resource Network (ODRN) and SAMARTH Portals launched

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Nov 8, 2023

During State Level Programme for observance of Odisha Disasters Preparedness Day, on 29th October 2023, two portals – ODRN (Odisha Disaster Resource Network) https://odrn.nic.in and SAMARTH (Statistical Analysis, Monitoring & Assessment of Resources in Training & Handholding)  https://samarth.odisha.gov.in/ were...

Launching of Vigilance Investigation and Prosecution Management System by Honourable Chief Minister, Odisha

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Nov 3, 2023

Hon'ble Chief Minister, Odisha, Shri Naveen Patnaik launched the Portal of Vigilance Investigation and Prosecution Management System, designed and developed by NIC, on the occasion of State Level Function for Vigilance Awareness Week on 30/10/2023. The purpose of the application is to provide...

State Level Workshop on eOffice 7.0 at Bhubaneswar, Odisha

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Sep 26, 2023

The State Level Workshop on eOffice 7.0 was successfully conducted on 16th September, 2023, at State Institute for Rural Development and Panchayati Raj (SIRD & PR) Conference Hall in Bhubaneswar, Odisha. The workshop was organized by NIC in collaboration with the Centre for Modernising Government...

Recent Issues

Highlights

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...