Search

Advanced Search

News

Showing 1091 to 1095 of 1442 records

Standardised District Portal of Balangir District (Odisha) launched

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jan 21, 2013

The Standardised District Portal of Balangir District (http://balangir.nic.in ) was inaugurated by Shri Surjya Narayan Patra, Hon’ble Minister for Revenue and  Disaster Management on 18 January 2013 in a function organised in the Conference Hall, Collectorate Building in presence of Hon’ble...

Second National IVFRT Conference held at New Delhi

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jan 19, 2013

2nd National Conference on Immigration, Visa, Foreigners’ Registration and Tracking (IVFRT) was organised by Ministry of Home Affairs (MHA) and National Informatics Centre (NIC) at India Habitat Centre (IHC), New Delhi on 10th January 2013. More than 300 Delegates from Ministry of Home Affairs...

MoU signed on Biometrics Solution for IVFRT-MMP

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Jan 10, 2013

An MoU was signed between NIC and ECIL on the ICT based Biometrics Solution for the IVFRT-MMP on 18th December 2012 at the venue Conference Hall, NIC (HQ), New Delhi in the presence of Dr. BK Gairola, Mission Director, Dr. YK Sharma, Director General, NIC, Mr. V. Vumlunmang, Joint Secretary (F), MHA,...

NIC Maharashtra Implemented e-Office Software Inaugurated at Sindhudurg District

Moiz Hussain, Maharashtra hussain[at]nic[dot]in
  |   Jan 2, 2013

Hon’ble Chief Minister of Maharashtra Shri Prithviraj Chavan inaugurated e-Office in Sindhudurg District Collector office  on 24-12-2012 in the presence of Industry Minister Shri Narayan Rane, Revenue Minister Shri Balasaheb Thorat, Chief Secretary, IT Secretary, SIO NIC Maharashtra, District...

Workshop-cum-Training on PRERANA at Sambalpur, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Dec 31, 2012

One-Day Training programme - cum - workshop was organized on 01.12.2012 on PRERANA in the Conference Hall of Collectorate, Sambalpur for all Institutes of the district. The Principals and Nodal Officers from 53 institutions out of 88 of the district attended the workshop. Welcoming the 91 participants...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...