Search

Advanced Search

District Level Workshop cum Training Session on Swachh Bharat Mission(SBM) MIS Application held at Mon District, Nagaland

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   Feb 11, 2016
DIO Mon, Mr. Ravi Ranjan Kumar presenting the features of the SBM-MIS
DIO Mon, Mr. Ravi Ranjan Kumar presenting the features of the SBM-MIS

Session on SBM-MIS underway
Session on SBM-MIS underway

A workshop cum training program on the implementation of SBM-MIS application was conducted by NIC, Mon District Centre, Nagaland, at the DC Conference Hall on 10th February 2016. All the features of the SBM-MOUD website (https://SwachhBharatUrban.gov.in) like Mission progress, ULBs login, Household/Citizen login Option, IHHL Application Format, IHHL Constructed Toilet Photo Upload Process, eCourses and many other features was explained by Mr. Ravi Ranjan Kumar, DIO, NIC, Mon.

The demo site URL: https://164.100.87.9/SBM Demo/ with demo user id and password have been shared with the participants to be familiar with the website for the efficient implementation of the application. The training session was attended by all the Administrators of the Municipal and Town Councils under Mon District. ADC, Mon representing Mon(TC) was present as Chief Guest as also EAC, Naginmora representing Naginmora(TC). SBM nodal person of Mon(TC) and CSCs coordinator of Mon and Naginmora also actively participated in the workshop cum training session.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...