Search

Advanced Search

Automation

Showing 61 to 65 of total 224 records

First Paperless Court of Judicature at Hyderabad

DR. A. RAMA MOHAN RAO, K. RAJASEKHAR, B. RAMCHANDER
  |   October 2016

The software can also record the dictation of the judgment into the computer which can be subsequently used by the Stenographer for transcription.

Monitoring of Handloom Schemes of Manipur using GIS

YENGKHOM JUNU SINGH, MAIBAM KUBIHEIBA MEITEI
  |   October 2016

GIS based applications are being used widely for analyzing and providing decision support for various activities. MOHSOM Software uses the technology to track the events and activities of the handloom schemes being implemented in a Cluster and thereby provide support in decision-making to the State Department

Telangana's Rashtriya Bal Swasthya Karyakram Software

DR. Y.S. MURTY, SRINIVASA SUBBA RAO AKELLA
  |   October 2016

This software captures various health conditions of children in the target age group. In cases where diseases are detected, or if medical intervention is required, support is provided free of cost and the parents of the affected children are informed through SMS automatically.

Oral Pre-Cancer Mobile App

VS RAGHUNATHAN, JAMES ARULRAJ, SARVANI G
  |   October 2016

The innovative App is very useful for Doctors and Dental Assistants in the diagnosis process and management of oral cancer in its early stages. ICT thus helps improve the quality of life of the citizens and saving lives using the best that ICT has to offer.

Revenue Court- Case Monitoring System of Odisha

P. K. PRAMANIK, R. N. BEHERA
  |   October 2016

Petitioners can now register a case online and track its status. Cause list is generated dynamically, which is published on the portal after approval by the competent authority. Hearing Notice is served online to the petitioner/ advocate and opponents by way of SMS, e-mail and physically through the...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...