Search

Advanced Search

News

Showing 1051 to 1055 of 1442 records

Standardised District Portal of Puri District (Odisha) launched

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Mar 31, 2013

  The Standardised District Portal of Puri District (http://puri.nic.in ) was inaugurated by Dr. Arabinda Padhee, IAS, RDC(CD) on Dt-20.03.2013 at NIC Puri in a function organized in the Video Conference Hall, Collectorate Building in presence of Sri Naba Kumar Nayak, Collector & DM,...

Haryana: Workshop on Integration of HALRIS/HARIS at District Gurgaon

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Mar 26, 2013

A Workshop cum training Programme was conducted for SDMs, DROs, Tehsildars, Naib Tehsildars & Junior Programmers of all Tehsils of District Gurgaon on 15th March. A presentation was made to apprise the officials about various steps involved in the process of integration of Land Records &...

Haryana: DIO, YamunaNagar received best DKMA Award for Rashtriya Swasthya Bima Yojna

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Mar 26, 2013

DIO YamunaNagar Sh. Ramesh Gupta received best DKMA Award for Rashtriya Swasthya Bima Yojna (RSBY) in the 5th State level RSBY workshop held on 9th march 2013 at Gurgaon DLF Phase V. In the year 2012-2013 in rural area enrolment for smart card is about 70 % which is top in Haryana and urban...

NIC Registering Authority Uttar Pradesh

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Mar 25, 2013

NIC-RA was setup in Uttar Pradesh in the year 2009 with the launch of e-Procurement & e-District system in the state. Various state government departments like PWD, Electronics & IT, Irrigation etc. started using the e-Procurement system which required Digital Signatures as authentication...

State Level Conference on IVFRT in Kerala

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Mar 18, 2013

Bureau of Immigration (BOI) and National Informatics Centre (NIC) jointly organized the First State Level Conference on Immigration, Visa, Foreigners’ Registration and Tracking (IVFRT) at Sonata Hall, Mascot Hotel, Thiruvananthapuram on 12th March, 2013.  About eighty participants from...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...