Search

Advanced Search

eGovernance workshop & NIC Data Centre visit for IAS Probationers at NIC, UP State Unit, Lucknow

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Jul 30, 2015
IAS & IFS Probationers from different districts during the workshop
IAS & IFS Probationers from different districts during the workshop

Dr. Saurabh Gupta, STD & SIO addressing the participants
Dr. Saurabh Gupta, STD & SIO addressing the participants

A half day workshop on eGovernance was organized at NIC, U.P. State Unit, Lucknow for the IAS & IFS probationers in the state. 12 IAS & 3 IFS probationers posted at various positions in the districts attended the three hour workshop held at Yojna Bhawan, Lucknow. The session was divided into two parts. In the first session, Dr. Saurabh Gupta, STD & SIO, NIC, Uttar Pradesh Pradesh presented in detail the various eGovernance projects in the state including eDistrict, eScholarship, Land Records, Treasuries, Transport, Commercial Tax, UP Public Service Commission, Social Pensions, Food & Civil Supplies etc. He also gave an overview of the IT infrastructure available at the NIC, State Centre and the Districts. The participants showed keen interest in various eGovernance projects and future roadmaps, they also discussed various challenges faced at the district level with NIC project teams.

In the second session a visit to the NIC Data Centres was organized for the participants. Here the participants were shown the NIC Server Farm, storage solutions, backup infrastructure and NICNET & NKN NoC. The participants were also shown real-time Network Monitoring through NMS. The workshop ended with the vote of thanks by the participants.
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...