Search

Advanced Search

99th Indian Science Congress at Bhubaneswar live Web Cast

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jan 24, 2012
Inauguration by PM
Inauguration by PM

Team of NIC Odisha State Unit involved
Team of NIC Odisha State Unit involved

The Indian Science Congress Association (ISCA) owes its origin to the foresight and initiative of two British Chemists, namely, Professor J. L. Simonsen and Professor P.S. MacMahon. It occurred to them that scientific research in India might be stimulated if an annual meeting of research workers somewhat on the lines of the British Association for the Advancement of Science could be arranged. Since then the Indian Science Congress is being held every year.

The 99th Indian Science Congress was held at KIIT, Bhubaneswar from 3rd to 7th January’ 2012. The Honourable Prime Minister of India Shri Manmohan Singh has inaugurated the event on 3rd January’ 2012. NIC Odisha State Centre had webcast the inaugural ceremony. The inaugural ceremony of Children’s Science Congress by the Hon’ble former President of India Dr. A. P. J. Abdul Kalam on 4th Jan’ 2012 was also covered under webcast.

The live webcast was done locally at NIC, Bhubaneswar with the technical support from Web services and Datacenter Division, NIC(HQ), New Delhi. The team engaged at NIC Bhubaneswar for the purpose include Dr. R. N. Behera, Technical Director, Sri K. C. Pattnaik, PSA, Sri Sambit Panda, PSA, Sri B.L. Gupta, Programmer headed by Sri S. K. Panda, SIO and STD.

The management committee of Indian Science Congress applauded the live webcast of the event by NIC.
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...