Search

Advanced Search

Open Data

Showing 6 to 10 of total 14 records

Awareness programme on National Data Sharing & Access Policy (NDSAP) at Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Oct 28, 2013

NDSAP aims to provide an enabling provision and platform for proactive and open access to the data generated by various Government of India entities. The objective of this policy is to facilitate access to Government of India owned shareable data (along with its usage information) in machine readable...

Workshop on NDSAP and Open Government Platform at Shimla, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Jun 24, 2013

A one-day awareness workshop on National Data Sharing and Accessibility Policy and Open Government Platform was held at Shimla on 21-June-2013 under the Chairpersonship of Sh. P.C. Dhiman IAS, Principal Secretary (Information Technology) to the Government of Himachal Pradesh. About 80 officers from...

 It has been almost a year and 852 datasets and counting.  Data Portal India (http://data.gov.in), an Indian Government Open data initiative has come a long way, it all started with GOI announcing the NDSAP (http://data.gov.in/sites/default/files/NDSAP.pdf) and National Informatics Centre,...

Workshop on Open Government Data & Civic Engagement

D.P.Misra, Delhi dpmisra[at]nic[dot]in
  |   Apr 15, 2013

With the goal to discuss the important aspects of Open Government Data & Civic Engagement, National Informatics Centre (NIC) conducted a workshop on April 4, 2013 at India Habitat Centre, New Delhi. Though primarily the workshop was targeted at Data Controllers nominated by various Ministries/...

NIC Namchi has been a pioneer in using technology to improve governance and citizen services. From automating document issuance with management software to revolutionizing disaster management with the Apada Sewa Mobile App, NIC Namchi has set a benchmark for efficiency, transparency, and innovation,...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...