Search

Advanced Search

Launching of e-Office at State Transport Authority, Odisha, Cuttack

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Nov 30, 2015
Transport Commissioner Launching the programme
Transport Commissioner Launching the programme

Participants of the Session
Participants of the Session

eOffice for the State Transport Authority (STA), Odisha, Cuttack is launched at the Conference Hall of STA by the Secretary, Department of Administrative Reforms & Public Grievances, Government of India, Sri   Debendra Choudhury, IAS on 13th November 2015 at 11am in the presence of Dr. C. S. Kumar, IAS, Transport Commissioner & Chairman, STA and Sri Santh Gopalan, IAS, Chief Executive, CMGI, Odisha.

NIC has developed the product e-Office with an aim to support e-governance by ushering in more effective and transparent inter and intra-government processes. The vision of e-Office is to achieve a simplified, responsive, effective and transparent working of all Government offices.

The Open Architecture, on which e-Office has been built, makes it a reusable framework and a standard reusable product amenable to replication across the governments, at the Central, State and District level. The product brings together the independent functions and systems under a single framework.

Sri S K Panda, SIO & DDG has reviewed and expressed to implement eOffice in other offices. The inaugural function was coordinated by Dr. R. N. Behera, STD, NIC, and Bhubaneswar. Sri Bimal Kumar Panda, TD presented the eOffice application features and other IT activities of Transport Department. Dignitaries present in the occasion include Sri Saroj Kr. Patro, SSA, NIC (HQ), Sri S. K. Bhol, TD, Ms. Mamata Khamari, DIO, Cuttack, Addl. Transport Commissioner and other senior Officers of the department, CMGI and NIC

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...