Search

Advanced Search

Launching of Verbatim House Proceedings in Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Aug 5, 2009
Launch of Verbatim House Proceedings
Launch of Verbatim House Proceedings

Himachal Pradesh Vidhan Sabha became second state in the country on 4th August 2009 which was observed as 103rd Birth Anniversary of Dr Yashwant Singh Parmar, when Honourable Chief Minister of Himachal Pradesh Prof. Prem Kumar Dhumal formally launched the verbatim House Proceedings of Himachal Pradesh Legislative Assembly (unedited version) on Vidhan Sabha website at http://hpvidhansabha.nic.in. Speaking on the occasion, he said that the facility will make the citizens aware about polices & programmes of the state government and also they will closely watch the issues raised by the elected representatives. He also informed that days’ proceeding will be made available on the same day or by next morning.

He also thanked all the concerned in the launching of this facility. The National informatics Centre, Himachal Pradesh has developed and implemented the solution to merge/compile day’s proceedings and the web interface.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...