Search

Advanced Search

Ministry of Development of North Eastern Region (MDONER)

Lokesh Joshi, lokesh[at]nic[dot]in
  |   Jan 27, 2015

The Ministry of Development of North Eastern Region (MDONER) is accountable for handling the matters relating to the planning, execution and monitoring of development schemes and projects in the North Eastern Region of India. The aim of the website is to provide instant information about North East Region of India, various development activities in the region, Infrastructure updates, etc.

The indigenously designed website comes with a clean interface and well-laid content arranged in four broad categories on the Homepage- About Ministry (Who’s Who, Associate Organizations, Parliament, Citizen’s Charter etc.), Activities(NLCPR, Externally Aided Projects, Look East Policy, etc.), Infrastructure (General, Roads, Railways, Power, etc.) and About North-East(Constitutional Provisions, Maps, States of the North-East etc.). Photo Gallery module is incorporated for presenting the images on the website in a well-structured manner. Visitors can also do free text search in web pages as well as linked documents. Links to NLCPR MIS, File Tracking and Intranet Portal have also been provided.

MDONER website is bilingual with English and Hindi versions. The website also has explicitly stated Accessibility Statement, Compatibility Statement, Terms & Conditions, Website Policies, Copyright Policies and Disclaimer. The site comes with assistive technologies such as Screen Readers Access to facilitate readers with visual impairment.

The website has a dynamic sitemap covering links up to the last level. In terms of interactivity, the site offers links to the twitter account. 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...