Search

Advanced Search

Training Programme for Revenue Inspectors at Revenue Inspector Training Institute (RITI) Sambalpur, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Feb 7, 2017
DIO addressing in the training
DIO addressing in the training

Participants at the programme
Participants at the programme

The training programme on “I.C.T. applications in Revenue administration” was organised by DIO, NIC, Sambalpur  for Revenue Inspectors of different districts of northern Odisha at Revenue Inspectors Training Institute (R.I.T.I.), Larkank, Sambalpur.

R.I.s are the grassroots level revenue officials and ICT knowledge is very much essential to deal with e-Governance applications used / to be used for revenue administration. To cater the e-Governance knowledge upgradation need of these officials, NIC, Sambalpur conducted a training programme on various ICT applications running in the Tahasils.

Training was conducted by Sri Rudra Prasad Dash, DIO, NIC, Sambalpur supported by Sri Neetesh Chandra Khatry, DeGS Manager, Sambalpur. Training was focused on following topics relevant to Tahasils.

1.     e-Governance

2.     Bhulekh and Web Based online Mutation s/w

3.     Document Management System (DMS) for modern record rooms

4.     e-District

5.     Common Service Centers(CSCs)

6.     Digital Locker etc.

All the above topics were explained to the participants in detail through power point presentations. Brief overview was given on upcoming technology like hi-tech survey etc. At the end, Questions & Answer session was conducted and doubts of the participants were clarified by Sri R. P. Dash, DIO, Sambalpur. 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...