Search

Advanced Search

News

Showing 821 to 825 of 1491 records

Jeevan Pramaan Camp for ex-servicemen held at Dimapur on 19-20 May 2015

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   May 22, 2015

Jeevan Pramaan Camp for the ex-servicemen of Dimapur & Peren Districts was successfully held on the 19th and 20th May, 2015 at the DC Office Complex, Dimapur. The event was organised by Rajya Sainik Board, Nagaland, Kohima led by its Director, Brig. K. K. Roy Choudhary, SM, VSM (Retd.) and...

Review by Second Sub-Committee of Parliament on Official Language

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   May 18, 2015

The Parliament Sub-Committee on Official Language reviewed the proceedings of NIC Odisha State Centre on 11th April 2015. The committee was represented by Honourable MPs including Dr. Prasanna Kumar Patsani, Dy. Chairman, Sri Laxmi Narayan Yadav, Dr. Sunil Baliram Gaikward and Sri Vashistha Narayan...

eProcurement Awareness Training Report- Nagaland

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   May 15, 2015

eProcurement Awareness Training Report- Nagaland   As part of the Nagaland State eProcurement & Tendering Cell, Government of Nagaland, State Nodal Officer of Nagaland for eProcurement Circular No.NSePC/GEN-1/2014-15 Dated the 26th February 2015 and requests from the Office of the...

Jeevan Pramaan Camp for ex-servicemen held at Kohima on 12-13 May 2015

Novotsono, Nagaland novotsono[dot]natso[at]nic[dot]in
  |   May 15, 2015

Jeevan Pramaan Camp for the ex-servicemen of Kohima District was held on 12th and 13th May, 2015 at the DC Office Complex, Kohima. The event was organised by Rajya Sainik Board led by Director of Sainik Welfare and Resettlement Brig. K. K. Roy Choudhary, SM, VSM (Retd.)  and NIC Nagaland...

eSamikSha did great job in Nepal Mission Success

Dr. Shubhag Chand, Delhi shubhag[at]nic[dot]in
  |   May 13, 2015

eSamikSha played a seminal role in India’s gigantic rescue and relief mission in Nepal and India after the April 25 earthquake, which has been a big success by all accounts. The rescue and relief operation in the aftermath of the devastating earthquake was incessantly monitored at the highest...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...