Search

Advanced Search

News

Showing 1216 to 1220 of 1499 records

Online SPIDER Portal and eMANCHITRA selected for PC Quest Awards 2012

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Jul 13, 2012

PC Quest, on its 25th anniversary has organised Best IT Implementation Awards, 2012. Out of 175 nominations from over 30 cities and 25 different types of industries, SPIDER and eMANCHITRA of Department of Planning, GoUP and NIC, Uttar Pradesh have cleared the second and third stage to be amongst the...

Rath Jatra - 2012 on Live Web Cast

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jul 9, 2012

The much awaited Car Festival -2012, the festival of chariot of Lord Jagannath, Puri has taken place this year on 21st June 2012 followed by Bahuda Jatra on 29th June and SunaVesa on 30th June 2012.   National Informatics Center(NIC), Odisha State centre did live webcast of the mega festival...

Jan Suvidha Kendra - A new hope for Pilibhit, Uttar Pradesh.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Jul 9, 2012

The most awaited Jan Suvidha Kendra of Pilibhit has now marked its existence in the web world with URL address www.jskpilibhit.com. It was inaugurated by commissioner of Bareilly Sri K. Ram Mohan Rao as on 22nd May 2012. JSK offers a unique way to address public grievances. It records the public grievances...

Two-Days Workshop on Panchayat Centric Applications at Shimla

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Jul 5, 2012

A Two day Workshop on Panchayat Centric Applications was held on 27th and 28th, June 2012 at Panchayati Raj Training Institute, Mashobra, Shimla. About 70 participants from all over the State from the Departments of Rural Development and Panchayat Raj...

DG NIC Visits NIC Shillong

Sabyasachi Choudhury, West Bengal sabyasachi[dot]choudhury[at]nic[dot]in
  |   Jun 26, 2012

The Director General (DG) of National Informatics Centre (NIC), Dr. B. K. Gairola, visited Shillong on 19th June 2012. After attending the North East Information Technology Ministers’ Consultative Meeting at Pine Wood Hotel, Shillong, the DG, along with Dr. Shefali Dash, Deputy Director General...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...