Search

Advanced Search

Mid-Day Meal Application of SME Dept., Govt. of Odisha bagged Skoch Smart Governance Platinum Award- 2017

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Sep 18, 2017
Platinum Award
Platinum Award

Order of Merit Award
Order of Merit Award

The SMS based monitoring system of Mid-Day Meal Programme of School and Mass Education Dept., Govt. of Odisha (URL : mdmodishasms.nic.in) developed by NIC Odisha State Centre  has brought the glory to the state in the field of Information Technology (IT) by receiving the Skoch Smart Governance Awards (Platinum Award)-2017.

The awards were conferred in a mega ceremony and conference at Constitution club of India, New Delhi on 8th - 9th September 2017. The Platinum Award for MDM programme was received by Sri Gangadhar Sahoo, State Nodal Officer, MDM, Odisha along with other senior Officials of SME Dept.

This application was developed by NIC to monitor the Mid-Day Meal program through SMS on real time basis. It collects information on Mid-Day Meal consumption on a daily real time basis, IFA tablet consumption on a weekly basis and Cook-cum-Helper Absentees report on a monthly basis. The monitoring system is also available through Android mobile app (MDM Odisha) which can be easily downloaded from Google Play store.

The web and mobile application was developed by the team comprising of Dr R N Behera, Sr. Technical Director as Team Leader, Sri A. K. Pattanayak, TD and Sri B. L. Gupta, SA as Team Members under the guidance of Sri P. K. Pramanik, DDG & SIO, Odisha.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...