Search

Advanced Search

NIC Haryana Presented e-Dashboard in North Zone symposium on Best Electoral Practices

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Aug 5, 2014
Sh. Surjeet Singh, Scientist E NIC Haryana presenting eDashboard to the participants
Sh. Surjeet Singh, Scientist E NIC Haryana presenting eDashboard to the participants

A North Zone symposium on Best Electoral Practices was held on 25th July, 2014 at Hotel Mount View, Sector-10, Chandigarh. There were 30 participants (Chief Electoral Officers, Addl. CEOs, IGP Ranges/ SPs & District Electoral Officers) from Northern States/UTs (Punjab, Haryana, Himachal, UP, J&K, Rajasthan & Uttrakhand, Delhi & UT Chandigarh) who attended the symposium. It was chaired by Election Commissioner, ECI along with DG, ECI & CEO, UT Chandigarh.

There were five sessions on following five topics:
1.    Management of Electoral Rolls
2.    Voter’s Education & Electoral Participation
3.    Security Management
4.    Innovation in use of Technology
5.    Expenditure Monitoring & Tracking Money Power.
For Presentation: Each Participant made one presentation on one of the above Topic ( 07 minutes for the presentation and 03 minutes for question & answer session).

NIC Haryana, from Northern states, was selected for presenting the “e-Dashboard Haryana for poll Management” under the heading Innovations in use of Technology in the symposium by Sh. Srikant Walgad, IAS CEO, Haryana. Sh. Surjeet Singh, Scientist “E”, NIC Haryana was deputed to make the presentation on e-Dashboard Haryana for poll Management & to apprise the house on the ICT implementation & Innovations in use of Technology in Haryana, during the Lok Sabha Elections-2014.

The DG, ECI appreciated the efforts of NIC Haryana for successful development & implementation of e-Dashboard for poll management on poll day and counting day. He informed that he will discuss the details with ECI, IT Team & may call NIC Haryana team to ECI for further discussion.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...