Search

Advanced Search

NIC Odisha bags EDGE Awards - 2014

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Sep 9, 2014
Dr. R. N. Behera, Sr. Tech. Director receiving the Award
Dr. R. N. Behera, Sr. Tech. Director receiving the Award

The Award
The Award

NIC Odisha has bagged three awards on EDGE (Enterprises Driving Growth and Excellency using IT) Information Week Magazine Awards- 2014 for smart Governance on 5th Sept 2014 at Bombay Convention and Exhibition Hall, Mumbai.

The awards were received by Dr. R N Behera, Sr. Technical Director, NIC Odisha, Bhubaneswar in 3 different areas:

  1. e-Pothi  : Online Cataloguing of Manuscripts of  Odisha State Museum

          URL: http://odishamuseum.nic.in

The objective of the project is to Facilitate researchers, students, scholars across the Globe to get online access the rare manuscripts of Odisha,  spread awareness among the people  about the Indian culture and heritage, and virtual walk through of the Museum.

  1. ‘e-Sakhyam’ - Accessibility portal for State Commission for Persons with Disabilities, Odisha with case management system

           URL: http://scpdodisha.nic.in

  1. NIC Odisha as an Organisation got Enterprise Application award for achiever in various IT activities. This is an overall award for the organisation in Smart Governance in different fields.

Various dignitaries present in the award ceremony are Country Head FACE Book, Country Head Intel, Wall Mart, National Co-convener, Information Cell - BJP, Representative of Infosys, TCS, Wipro and other entrepreneurs of the Country.

The projects were initiated by Govt of Odisha and executed by NIC, Odisha under the supervision of Sri S.K.Panda, DDG & SIO, Odisha. The team comprising Dr. R N Behera, STD as Team Leader, Sri K.C.Pattnaik, PSA, Sri A.K.Pattanayak, PSA, Ms. Namita Senapati, PSA, Sri S.K.Sahoo, PSA,Sri R.K.Sahoo, SA, Sri B.L.Gupta , SO-Engr-SB have been involved in the development of these  projects.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...