Search

Advanced Search

IVFRT Workshop on C-FORM and S-FORM organized at Udupi District, Karnataka

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Oct 3, 2013
Inauguration of the Workshop
Inauguration of the Workshop

Participants in the Workshop
Participants in the Workshop

A district level workshop was organized by Udupi District Police with Manipal University at Manipal University Admission Hall, Manipal, Udupi District Karnataka on 27th September 2013 to create awareness on online submission of C-FORM and S-FORM. The participants included representatives of Manipal University and Hoteliers of Udupi District.

The Dean of Manipal University inaugurated the workshop along with Dy. Superintendent of Police, Udupi District and NIC officials in the presence of many other dignitaries.

The welcome speech on the importance of C-FORM and S-FORM was given by the Deputy Superintendent of Police, Udupi district. NIC IVFRT team consisting of Sh. K. Saravanan, SSA, Sh. Rajeev, SSA and Sh. Eswaran, SSA demonstrated presentations on C-FORM and S-FORM.

The Deputy Superintendent of Police had applauded the initiative taken by NIC for the successful conduct of the workshop on various districts.

Manipal University having 20 – 25 colleges under them and having foreign students over 3000 in their university shown the keen interest in making the workshop successful. After completing the demonstration on C-FORM and S-FORM, colleges under Manipal University were registered live and approved by DSP in front of the participants and student details were also fed, so that the college authorities understand the flow easily.

Sh. Manjunath, DIO and Sh. Aravind Nehru, ADIO of NIC, Udupi District contributed significantly to make the workshop successful. The workshop ended with hearty vote of thanks to all.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...