Search

Advanced Search

Sensitisation programme on eOffice at MCL, Sambalpur, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Nov 30, 2016
SIO addressing on the occasion
SIO addressing on the occasion

e-Office team and MCL officials at Meet
e-Office team and MCL officials at Meet

Mahanadi Coalfields Limited (MCL), a subsidiary of Coal India Ltd, has requested NIC, Odisha State Centre to implement eOffice at MCL Corporate Office, Burla. In this context the sensitisation programme on eOffice to Senior Level Officers of MCL was arranged at the Conference Hall, MCL, Burla on dt-24.11.2016.

Sri P. K. Pramanik, DDG & SIO, Odisha State Centre, Dr. R N Behera, Sr. Technical Director, NIC, Bhubaneswar and Sri B. P. Satapathy, PSA delivered the presentation to the Senior Officers of MCL.

Addressing on the occasion, SIO informed that NIC has developed the product e-Office with an aim to support e-governance by ushering in more effective and transparent inter and intra-government processes. The vision of e-Office is to achieve a simplified, responsive, effective and transparent working of all Government offices. 

He also added, the Open Architecture, on which e-Office has been built, makes it a reusable framework and a standard reusable product amenable to replication across the governments, at the Central, State and District level. The product brings together the independent functions and systems under a single framework.

eOffice is centrally coordinated  by  Ms.  Rachna Srivastava, STD and her team members including Sri Saroj Kr. Patro, SSA and others at NIC(HQ), New Delhi.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...