Search

Advanced Search

AEBAS Training Camp Held at the Directorate of Fisheries, Bilaspur, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Sep 17, 2015
Director-cum-Warden Fisheries speaking during the Training
Director-cum-Warden Fisheries speaking during the Training

Training Session in Progress
Training Session in Progress

A one day training on Aadhaar Enabled Biometric Attendance System was organised by NIC Himachal Pradesh in the Directorate of Fisheries, at Bilaspur  on 11th September 2015 for smooth roll-out of the AEBAS in all the District and Division level offices of the Fisheries Department.

About 25 officers, including all Deputy Directors, Assistant Directors and other officials posted at Division/ District level participated in this training.

Sh. Shailender Kaushal, State AEBAS coordinator and Sh. Rakesh Kumar, DIO Bilaspur imparted the training-cum-registration of the participants for implementing the AEBAS. A Finger Print recognition device was installed in the training hall and besides holding the demonstration on how to install FP devices; registration of officers present in the training was during the demonstration itself.

Detailed information was provided and various queries raised by the officers were addressed properly by the NIC Team, including the SIO, NIC HP. The AEBAS portal of the Department of Fisheries is already functional. It was decided that all Divisional officers will place supply orders to HPSEDC for the purchase of FP device and the same will be installed in all the offices compliance of which shall be reported by all officers to Directorate within one month.

Sh. Gurcharan Singh, Director-cum-Warden of Fisheries, Himachal Pradesh extended deep gratitude to the team of NIC for coming from Shimla and imparting such a valuable training to the officers of Department, which is the need of the hour and will be very helpful to the Department.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...