Search

Advanced Search

Training on ICT Tools to Judicial Officers of District Court, Samastipur

N.K Prasad, Bihar nk[dot]prasad[at]nic[dot]in
  |   Oct 29, 2009
Judicial Officers on Laptop during Training Hands on
Judicial Officers on Laptop during Training Hands on

A training programme on ICT Awareness was conducted for the Judicial Officers of District Court, Samastipur under the e-Court project. The training programme conducted in five phases from 01/09/2009 to 16/10/2009 and altogether 25 participants participated in the above training programme. Above Training programme was initiated with joint initiation of Hon’ble Shri Syed Md. Nasimuddin, District & Sessions Judge, Samastipur and Shri Nirmal Kishor Prasad, PSA & DIO, NIC, Samastipur. During each phase of training topics covered were Linux Operating System for Judicial Desktop System (JDS), OpenOffice vis-à-vis Microsoft Office, internet, E-mailing, LAN, Antivirus software and its use etc. The above Foundation Course on ICT for e-Court Project was designed in such a manner that it will exclusively suit the need of the Judicial Officers. The adopted training methodology comprised of class room lectures, hands-on, feedback sessions and finally an examination test for all participants. Encouraged by the above training, jointly another training course on advanced topics suited for e-Court project is being planned. The entire training was imparted and well conducted by Shri Wajid Ali, Systems Officer, NIC, e-Court project, District Court, Samastipur. The District & Sessions Judge, Samastipur has all praise for DIO, NIC, Samastipur and the Systems Officer, NIC, e-Court project, District Court, Samastipur. The feedback on training of Shri Om Prakash Singh, Judge Incharge, District Court, Samastipur says “The Training was well planned and very useful…”.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...