Search

Advanced Search

News

Showing 181 to 185 of 1442 records

Honble Chief Minister, Assam, reviews KRITAGYATA (Online Pension Sanction and Payment Tracking)

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Jun 29, 2021

On 26th June 2021, Dr. Himanta Biswa Sarma, Hon’ble Chief Minister of Assam reviewed the activities of Pension & Public Grievances Department, Assam. During the review, Hon’ble Chief Minister also reviewed NIC developed portal  “Kritagyata”, an online pension sanction...

Chhattisgarh to have unique Identification of Land parcels. Revenue Secretary Launches ULPIN

Y. V. Shreenivas Rao, Chattisgarh yvsrao[at]nic[dot]in
  |   Jun 26, 2021

On 23rd June 2021, Ms. Reeta Shandilya, Secretary, Revenue & Disaster Management, Govt. of Chhattisgarh launched the ULPIN (Unique Land Parcel Identification Number) utility for Chhattisgarh in the virtual presence of Shri Ajay Tirkey, Secretary, DoLR, Govt. of India, Shri Hukum Singh Meena, Addl....

Prashikshan Mobile App - An initiative by District Election Officer Hailakandi

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Jun 15, 2021

The app will be a ready reckoner for the polling personnel who have undergone training for the upcoming Assembly election to three legislative constituencies of Hailakandi, Katlicherra and Algapur slated for April 1, 2021.The detail poll process from Day 1 till the end of the exercise will be available...

The Chhattisgarh Transport Department is going to deliver the Smart Card based Driving License (DL)and Registration Certificate (RC) to the citizens of Chhattisgarh at the address registered  by them on the Transport portal. On 1st June 2021   Hon’ble Chief Minister of Chhattisarh, ...

Remembering Dr. N. Seshagiri, India's ICT Evangelist and Founder Director General of National Informatics Centre

Informatics News Desk, NIC-HQ newsdesk[dot]info[at]nic[dot]in
  |   May 26, 2021

Dr. Narasimaiah Seshagiri, Padma Bhushan Awardee and a pioneer of revolutionary changes in the technology domains of space, satellite communication, electronics, and public private partnerships in e-Governance left for heavenly abode on 26th May, 2013. Eight years have passed by, but his futuristic...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...