Search

Advanced Search

News

Showing 1256 to 1260 of 1441 records

Timely availability of Fertilizer to the farmers in required quantity is an important ingredient for the Agriculture production in the country. To track the movement and information availability & visibility across whole Supply Chain, Government of India has decided to implement an mFMS (Mobile...

The monsoon session of Haryana Vidhan Sabha was convened on 19/08/2011 on a very short notice of just one week in a cabinet meeting held on 11/08/2011. The Finance Department was supposed to prepare and present Supplementary Estimates 2011-12 (Ist Installment) in Bilingual and Regularization of Excess...

Unique to MCL – Apart from COAL it is e-PROCUREMENT

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Aug 17, 2011

15th August is a golden letter day for MCL as new era started in MCL Governance with GePNIC implementation on this day in 2009. Just before celebrating completion of second year of eProcurement project rollout in all the subdivisions and divisions and HQRs of MCL, Shri A.K Sahay,   Chief...

A review on the eve of Completing third year of state wide roll out of GePNIC by Govt of Orissa

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Aug 17, 2011

Soon after Orissa celebrated third year of its State wide roll out of eProcurement on 1st July 2011, Shri  Pradeep Jena,I.A.S, Commissioner-cum Secretary, IT Department, Govt. of  Orissa took a Review meeting recently at Orissa State Secretariat, Bhubaneswar followed by one more review meeting...

NIC Rajasthan Wins Two Awards at eWorld Forum 2011

Chandan Sen, Rajasthan chandan[dot]sen[at]nic[dot]in
  |   Aug 16, 2011

NIC Rajasthan Shines at eWorld 2011 Forum NIC Rajasthan added yet another  feather in its cap by winning two prestigious  awards recently at the eWorld 2011 Forum New Delhi held from the 1st-3rd August 2011. The team from NIC Rajasthan led by SIO Smt. Indu Gupta  along with Tarun...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...