Search

Advanced Search

News

Showing 931 to 935 of 1473 records

2nd IVFRT Workshop organized in Gujarat State during 6th - 7th February 2014

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Mar 5, 2014

2nd IVFRT Workshop was conducted during 6th-7th February 2014 at DGP Office, Police Bhawan, Gandhinagar – the state capital of Gujarat to share the developments of IVFRT Modules, create awareness of state-wide IVFRT rollout and achievements. More than 140 participants comprising of FRO officials,...

State level workshop on IVFRT project at NIC, Bhubaneswar, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Mar 3, 2014

Recognized as one of the high priority Mission Mode Project of Govt. of India and National Informatics Centre, IVFRT (Immigration Visa Foreigner’s Tracking System) is being under implementation across the Nation and Indian Mission outside the country. With the objective to develop and implement ...

Inauguration of C-FRO module under IVFRT project at Puri, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Mar 3, 2014

The C-FRO module for Puri district of Odisha was inaugurated on 1st Feb 2014. Shri Anup Sahoo, IPS, SP and FRO Puri, welcomed all the guests and dignitaries to the event and the program was formally inaugurated by Shri Lalit Das, IPS, Special Secretary to Home Department, Govt. of Odisha. Dr....

HARYANA : e-Haryana Workshop for two days Organized at Chandigarh

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Feb 28, 2014

The e-Haryana  - a two days workshop  was organized on February 7-8, 2014 jointly by Secretariat for Information Technology , Government of Haryana and eGov Magazine at Chandigarh. The theme of the workshop was,   shaping the future of Electronic Services Delivery. The Secretariat for...

Training Programme on S-FORM under IVFRT System held at Jaipur, Rajasthan

N.K Prasad, Delhi nk[dot]prasad[at]nic[dot]in
  |   Feb 18, 2014

A one day training programme was organised on 13th February 2014 at Suresh Gyan Vihar University, Jaipur to implement S-FORM module under IVFRT-MMP at Jaipur, Rajasthan. The 5 FRO Officials and along with 13 representatives from various educational institutes participated in the Training Programme....

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...