Search

Advanced Search

Haryana:Message from State Election Commissioner Haryana for NIC Haryana

Rahul Jain, Haryana rahul[dot]jain[at]nic[dot]in
  |   Jun 16, 2016
Rajeev Sharma, IAS (Retd.)  State Election Commissioner,  Haryana
Rajeev Sharma, IAS (Retd.) State Election Commissioner, Haryana

E-Dashboard  a web based online application developed and implemented by National Informatics Centre (NIC), Haryana for the conduct of elections for the Panchayati Raj Institutions (PRI) as well in Urban Local Bodies (ULB) -2016 recently held in the state of Haryana is a landmark innovation.

The said Dashboard dispense with all conventional monitoring and communication system as used earlier in electoral process system and introduced an automated real time monitoring system which further enhanced lot of transparency in the whole election process. With the inclusion of such ICT enabled technology more efficiency and transparency could be possible. I am hopeful that such e-dashboard shall be a generic application for all other such applications that always have critical and fixed time lines may be a contender for other such applications developed across the country.

I convey my appreciation for the innovative work done and dedication of the team of National Informatics Centre (NIC), Haryana headed by Sh Ghan Shyam Bansal, DDG & SIO (Haryana) for their untiring support and active contribution for extending total solution in conduct of elections.  

Rajeev Sharma, IAS (Retd.)

State Election Commissioner,

 Haryana

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...