Search

Advanced Search

Gold and Silver for Bihar Projects in 18th National Awards for e-Governance

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Feb 3, 2015
Sh. Rajesh Kumar Singh, SIO, NIC, Bihar with Sh. Arvind Kumar Chaudhary, IAS, Addl CEO, Bihar along with Project team receiving Award
Sh. Rajesh Kumar Singh, SIO, NIC, Bihar with Sh. Arvind Kumar Chaudhary, IAS, Addl CEO, Bihar along with Project team receiving Award

Sh. Rajesh Kumar Singh, SIO, Bihar, Sh. S.K.Shrivastava,TD, Sh. Niraj Kr. Tiwary,SA and Project Team with Awards
Sh. Rajesh Kumar Singh, SIO, Bihar, Sh. S.K.Shrivastava,TD, Sh. Niraj Kr. Tiwary,SA and Project Team with Awards

The 18th National Conference on e-Governance, based on the theme E-Governance: ‘Digital Governance - New Frontier’ was held at Mahatma Mandir, Gandhinagar, Gujarat during 30-31 January 2015.

National Informatics Centre, Bihar with Rural Development Department, Govt. of Bihar was conferred with Gold Award for SAMVIDA and with Office of Chief Electoral Officer, Bihar conferred with Silver Award for the Project Force Deployment Software.

SAMVIDA: National Informatics Centre, Bihar with Rural Development Department, Govt. of Bihar has been conferred with Gold Award in Special Sector Category - "Skill Development and employability" for Project SAMVIDA.

SAMVIDA, popularly known as online contractual recruitment/volunteer services portal, is the practice of using ICT technology and in particular Web-based resources for tasks involved with finding, attracting, training, assessing, interviewing and hiring new candidates/personnel under various schemes of state and central government

SAMVIDA portal is being used by various departments for selection of candidates for surveys, contractual appointments, short term appointments etc.

This facilitates unemployed youth to register to the website for getting services and alerts. Depending upon necessary eligibility criteria registered users automatically get sms and email for applying for suitable vacancies. The software provides facility for registering a person to the website by entering personal credentials. This allows departments to publish any advertisement for recruitment of volunteers or contractual appointments. This provides easy and effective method for and alternate methodology of recruitment. With most of public service commission’s overloaded and delayed with regular employment state government has decided to use alternate method of employment/volunteer selection process.

The Project team from NIC are Sh. Rajesh Kumar Singh, STD & SIO, Sh. Shailesh Kumar Shrivastava, TD and Sh. Niraj Kumar Tiwary, SA.

Force Deployment Software: National Informatics Centre, Bihar with Office of Chief Electoral Officer, Bihar has been conferred with Silver Award in "Innovative use of Technology in e-Governance" for Project “Force Deployment Software”.

This is a Workflow based application system which leverages spatial and textual data to generate various MIS to serve and facilitate various levels of decision support to force deployment related election machinery across 38 (Thirty Eight) districts consisting of 534 (Five Hundred and Thirty Four) Blocks, 243 Assembly Segments and 40 parliamentary segments of Bihar to facilitate District Administration and Police Administration, Election Commission of India, Office of Chief Electorate Officer and Citizens of State.

The project team from NIC are Sh. Rajesh Kumar Singh, STD & SIO, Sh. Shailesh Kumar Shrivastava, TD, Sh. Niraj Kumar Tiwary, SA and Sh. Prakash Kumar, SA.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...