Search

Advanced Search

Online SPIDER Portal and eMANCHITRA selected for PC Quest Awards 2012

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Jul 13, 2012
Spider in July 2012 issue of PC Quest
Spider in July 2012 issue of PC Quest

eManchitra in June 2012 issue of PC Quest
eManchitra in June 2012 issue of PC Quest

PC Quest, on its 25th anniversary has organised Best IT Implementation Awards, 2012. Out of 175 nominations from over 30 cities and 25 different types of industries, SPIDER and eMANCHITRA of Department of Planning, GoUP and NIC, Uttar Pradesh have cleared the second and third stage to be amongst the top 25 semi-finalist. Both the articles have been printed in the June and July 2012 issues of PC Quest Magazine.

SPIDER is an internet based data entry and retrieval system that facilitates decentralized, online data entry and updating on more than 4000 parameters thereby providing local level information in digital form for decision making.  This project is meant to identify the inter village panchayat, inter block and inter district disparities so that gaps can be found in developed and under developed areas. After implementation of SPIDER, state government is saving about 1.5 crore rupees per year by savings in paper, manpower, data entry and typing work, tabulation, travelling and meetings costs etc.

The eMANCHITRA (Map Based Analytical Charting and Reporting Application) aims at eliminating inter regional disparities that persist as a problem in decentralisation process, by generating grass root level thematic atlases based on SPIDER indicators. Generation of online thematic maps on a 24x7 basis helps in identifying various regional level disparities in the state. It reduces time lag, increases consistency and accuracy of the data cost efficiency and transparency, thus facilitating the super imposition of different layers on the same administration unit.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...