Search

Advanced Search

DIO Flagged off Digital India Outreach Campaign at Puri, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jun 29, 2016
DIO & ADIO on the occasion
DIO & ADIO on the occasion

Campaign in progress
Campaign in progress

The Digital India Outreach Campaign has been successfully launched at Gopinathpur Village under Gopinathpur Gram Panchayat, Puri Sadar Block, Puri District by Sri Biswanath Panda, DIO, NIC, Puri in the presence of Citizens of Gopinathpur GP.

He informed that Government of India has started Digital India Outreach Campaign, in which citizen would be made aware about the programs as well as welfare schemes/policies started by the government under its Digital India Programme.

M/S Jagran Solution Team created awareness regarding citizen centric services such as Digital Locker, NDLM, e-Post, e-Aadhaar, etc provided by Govt. of India under Digital India Programme etc. supported by DIO Sri Panda,  Sri Durga Prasad Jena, ADIO, NIC Puri, Local CSC representatives.

This campaign would continue at more than forty locations of the district.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...