Search

Advanced Search

Open Data

Showing 1 to 5 of total 14 records

A 31-Member Delegation from 27 Countries visits NIC for One-Day Symposium on Open Data Policy and Initiatives

Hemendra Kumar Saini, Delhi hemendra[dot]saini[at]nic[dot]in
  |   Dec 12, 2022

On Monday, 12 December 2022, a delegation of 31 Government Officials hailing from 27 Countries paid a visit to NIC Headquarters, New Delhi for one-day symposium on open data policy and initiatives. During the event, NIC Officers briefed them on Digital Platform and Products of NIC and held informative...

#OpenGovDataHack-Bhubaneswar, Odisha during 28th and 29th Oct 2017

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Oct 30, 2017

Open Government Data (OGD) Platform India of National Informatics Centre (NIC) in association with Internet & Mobile Association of India (IAMAI) & StartUp India organized a 24 hours Hackathon - “#OpenGovDataHack”  at Kalinga Institute of Industrial Technology (KIIT) Technology...

#OpenGovtDataHack - Pre-Hackathon Brainstorming Session at KIIT, Bhubaneswar, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Oct 27, 2017

The pre-hackathon Brainstorming session has been successfully organized in Technology Business Incubator (TBI) Campus - 11, Kalinga Institute of Industrial Technology (KIIT), KiiT University, Bhubaneswar on 26th October 2017. The objective of the workshop was to make the participants aware about the...

With the launching of open government data portal (https://odisha.data.gov.in) Odisha became the fifth state in India to open its data for free access and use by all stakeholders in machine readable format. On 17th October 2017 Chief Secretary Shri Aditya Prasad Padhi inaugurated the portal in...

Seminar on Open data and Accessibility Policy at Utkal University, Vanivihar, Bhubaneswar, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jun 20, 2014

With the increase in awareness on “National Data sharing and accessibility policy”, developers, researchers, Educationists etc. are interested to know more about the policy and the process to access the open data. To facilitate the same, a seminar was organized at Utkal University, Vanivihar,...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...