Search

Advanced Search

Digital India Outreach Campaign Flagged off from NIC State Centre, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jun 28, 2016
SIO doing the Flag Off
SIO doing the Flag Off

Officers of NIC participating in the programme
Officers of NIC participating in the programme

Under Digital India program, several products / services have been rolled out in the last two years to make governance more citizen-centric and transparent in the service delivery. To convey the message of this transformation and create awareness about various services / products, an outreach campaign has been started by Ministry of Communications & IT, GOI, across the country to reach out to citizens at district, sub-district and village level.

At Odisha, Sri S. K. Panda, DDG & SIO, flagged off the campaign at the campus of NIC State Centre in presence of all officers of NIC.

 Addressing on the occasion SIO wished that this initiative would certainly benefit common citizen in creating Awareness on Digital India and e-Services.

Team of M/S Jagaran Solutions, the executant of this campaign presented the street play, game, quiz etc. as it would be conducted across the state.

Earlier few rounds of meetings were organized with various stakeholders, CSC-SPV State coordinator, DIOs and the route map for first three districts was finalized. 

The exhibits then moved to three districts – Puri, Khurda and Cuttack –  to spread the Digital Awareness.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...