Search

Advanced Search

Haryana: e-Ticketing System for Surajkund Crafts Mela 2012

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Feb 4, 2012
Haryana: e-Ticketing System for Surajkund Crafts Mela 2012
Haryana: e-Ticketing System for Surajkund Crafts Mela 2012

e-Ticketing System for the visitors of Surajkund Craft Mela is inaugurated by Sh. Dhanpat Singh, Financial Commissioner & Secretary Tourism, Government of Haryana on 30th January 2012.

e-Ticketing System has been developed by NIC, Haryana.  This system has the facilities for booking the tickets on internet from anywhere using Debit/credit (Master/Visa) Card.It has been linked to the website of Tourism department (//haryanatourism.gov.in/).e-Tickets can be purchased from any resorts of the Haryana Tourism Corporation and HTC Delhi office. In order to safeguard duplication of tickets, Bar Code is printed on e-ticket and checked by Bar Code Scanner installed at all the Gates of Mela.

 Cost of ticket has been fixed Rs. 50 for general public and Rs. 25 for differently able persons & senior citizens. Details of cultural programmes and parking are also made available on the website. In addition to this Hand Held Electronic Ticketing Machines (ETMs) are also installed on all gates with specially developed Application Software.

Mr.Deepak Bansal, Technical Director & Mr. Yashpal, Scientist ‘C’ from NIC Haryana are involved in this project.

These facilities had reduced the long queue for tickets and made visit to the Mela more contented. Various Reports on visitors for management of the Mela are also published on the website.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...