Search

Advanced Search

NIC Rajasthan Wins Two Awards at eWorld Forum 2011

Chandan Sen, Rajasthan chandan[dot]sen[at]nic[dot]in
  |   Aug 16, 2011
The team of NIC Rajasthan Receiving the Award
The team of NIC Rajasthan Receiving the Award

NIc rajasthan Receiving the award for SUGAM
NIc rajasthan Receiving the award for SUGAM

NIC Rajasthan Shines at eWorld 2011 Forum

NIC Rajasthan added yet another  feather in its cap by winning two prestigious  awards recently at the eWorld 2011 Forum New Delhi held from the 1st-3rd August 2011. The team from NIC Rajasthan led by SIO Smt. Indu Gupta  along with Tarun Toshniwal, STD NIC Jaipur, H.S. Gehlot DIO Jodhpur , Chandan Sen, DIO Bundi, Amit Agarwal, PSA NIC Jaipur and Ankur Goel, DIO Ajmer received the Best Public Choice Awards for edistrict Initiative for the project Sugam Single Window System and the Best Public Choice Award for Rural Governance Initiative for the project Rural Connectivity (GPNIC) for Panchayat from Secretary IT & C ,Government of India , Shri R. Chandrashekhar and other dignitaries. NIC Rajasthan exhibited the award winning software applications, Sugam Single window and Rural Connectivity (GPNIC) for the Panchayats during the eWorld 2011 Forum exhibition at Ashok Hotel New Delhi . Delegates and IT professionals  from all over the world queried about the  applications and  expressed their happiness at the initiative . Sugam single window is being implemented in all the 33 districts of Rajasthan and GPNIC is being implemented in 10 pilot gram panchayats of the Ajmer district. SUGAM had also previously won an award at the CSI- Nihilent function in Pune a couple of years back.

 


 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...