Search

Advanced Search

Inauguration of online registration of employment exchanges at reo kohima

Swedesenuo Natso, Nagaland swede[at]nic[dot]in
  |   Feb 24, 2010

Employment Exchanges Computerization for the state of Nagaland is being formally inaugurated by the Parliamentary Secretary for Housing, Labour and Employment, Er. T. Saku Aier on 19th February 2010 at Regional Employment Exchange Office, Kohima.

Congratulating the Department for implementing the computerization project, he also lauded the NIC for the technical support given. He said that with the computerization,  job seekers and employers would benefit and would made the youth in the state come at par with the rest of the world. He also suggested to the Department to earn revenue through the project so as to show the Government about the works being done by department. Encouraging the Department officials present, he also said that the same should be replicated to the other districts of the state.  

Speaking on behalf of NIC, Nagaland, Shri Kemvu Elah, PSA and Project In Charge said the project could be successfully implemented in the Department due to the support given by the Director and his officials in the implementation of the Project. He said the Employment Exchange computerization is one of the National E Governance Mission Mode Project which is being implemented across the country. With the implementation of Employment Exchange Computerisation, it would help the Department to maintain records in a stematic manner and the detail information about the registered job seekers and employer can be had from anywhere and anytime.

Joint Secretary, Labour and Employment, K. Miasalhou and Director, Employment and Craftsmen Training  N. Panger Jamir also gave short speeches. The programme was attended well by the Departmental officials and Media.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...