Search

Advanced Search

NIC MP Bags State Govt. Awards for Excellence in E-Governance Initiatives 2009-10

Santosh Shukla, Madhya Pradesh santosh[dot]shukla[at]nic[dot]in
  |   Jul 14, 2010

In June,2010 Government of Madhya Pradesh has organized National e-Governance Knowledge Sharing Summit 2010 at Bhopal. In the summit State awards for excellence in E-Governence Initiatives 2009-10 were presented. NIC Madhya Pradesh was given awards in the following categories –

Best Application Software developed in Madhya Pradesh – Integrated-Forest Financial and Works Management System  (i-FFWMS) designed and developed by NIC MP has been declared as the Best Application Software developed in Madhya Pradesh.

Certificate of Excellence for E-Governance Initiatives -Scholarship Portal designed and developed by NIC MP has bagged the Certificate of Excellence for E-Governance Initiatives 2009-10 under IT for Masses Category.

Best E-Governed Districts Of Madhya Pradesh - District Gwalior and Seoni,  jointly wins  the award for best E-Governed Districts in Madhya Pradesh. In both the districts NIC has played a vital role in designing, developing and implementing the various ICT based citizen centric applications.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...