Search

Advanced Search

Automation

Showing 111 to 115 of total 222 records

National Knowledge Network (NKN) due to high bandwidth and low latency has ensured the creation of applications which will be beneficial to all stakeholders in science, technology, governance and research & development. A model project funded by NKN and executed by NIC, New Delhi; AIIMS...

iCJS: Inter-operable Criminal Justice System

DR. SAURABH GUPTA, AJAY SINGH CHAHAL
  |   October 2013

The Interoperable Criminal Justice System (iCJS) has been developed for the process of speedy justice by facilitating data-exchange between the courts, police/prosecution, jails and the forensic labs. The application has been developed by NIC for the District courts, prisons and Police...

Publishing of Exam Results & Online Counselling from NIC Data Centre T

VIJAY KUMAR VISHWAKARMA, ANUPAM JOHRI, MONAWWAR HUSSAIN, S.V. KRISHNA PRASAD
  |   October 2013

NIC Data Centre, Delhi has always played a proactive and pivotal role in providing robust, reliable and secure service-delivery platform to its hosted applications, be it a website, portal or any e-Governance project. Continuing with its decade long success trail, this year too, NIC Data Centre...

UBIQUITOUS PROMISES: Internet of Things

MUKESH K. RALLI
  |   October 2013

Human civilization over time devised various ways to communicate and interact with one another through the means of postal/telephonic/Internet based communication. Present world is enjoying all time connected phenomena, riding on the successful implementation of Internet and Internet based technology....

To monitor Revised National Tuberculosis Programme (RNTCP) effectively, a web-enabled and case-based monitoring application called NIKSHAY has been developed by National Informatics Centre (NIC). This is used by health functionaries at various levels across the country in association with...

Recent Issues

Highlights

Apr. ' 24 Issue


UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...


TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...


Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue


Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...


SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...


Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue


Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...


Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...


TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...