Search

Advanced Search

Visit of Honorable Union Minister of State for HRD, Communications and Electronics & IT to J&K UT on21-22 Jan. 2020 (Kalakote and Nowshera)

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   Jan 28, 2020
NIC J and K Team presenting bouquet to Honorable Union MOS  Shri Sanjay Dhotre at Jammu Airport
NIC J and K Team presenting bouquet to Honorable Union MOS Shri Sanjay Dhotre at Jammu Airport

SIO NIC J and K and Heads of other Departments including Local Leaders with Honorable Union MoS  Shri Sanjay Dhotre at Jammu
SIO NIC J and K and Heads of other Departments including Local Leaders with Honorable Union MoS Shri Sanjay Dhotre at Jammu

Hon’ble Shri Sanjay  Dhotre, Union Minister of State was received by SIO NIC J&K, Shri Abhay Kumar at Jammu airport on 21/01/2020.  SIO welcomed the Hon’ble Minister and presented a bouquet and also apprised Hon’ble MoS about the major IT related activities being performed by NIC in J&K. A status report of various Central/State Level projects was also presented to him.   

 

 

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...