Search

Advanced Search

News

Showing 1301 to 1305 of 1441 records

Online Summon Delivery & Monitoring System - Muzaffarnagar(UP)

Gaurav Tyagi, Uttar Pradesh gaurav[dot]tyagi[at]nic[dot]in
  |   Apr 8, 2011

Online Summon Delivery & Monitoring System software has been developed by NIC-Muzaffarnagar under the able guidance of Mr. Annant Kumar, District Judge, Mr. Pankaj Kumar, District Magistrate & Mr. Praveen Kumar, Senior Superintendent of Police, Muzaffarnagar.   Technological demonstration...

Mansa Devi temple is one of the oldest shrines of northern India in the foothills of the Shivalik range and is an epitome of the age old tradition of Shakti worship in the region. The board has also started receiving donations from devotees living in abroad. On the first Navratra, Honorable Chief...

Hon.Chief Justice of High Court of Uttarakhand, Mr.Barin Ghosh inaugurated the websites of “High Court of Uttarakhand” and “all the 13 subordinate District Courts in the state” on 16th Mar-2010 at High Court, Nainital in the presence of all the Hon. Judges, Registrar General...

Video Conference facility inaugurated at State Information Commission, Punjab

Sarbjeet Singh, Punjab singh[dot]sarbjeet[at]nic[dot]in
  |   Mar 11, 2011

           State Information Commission is now connected with all the districts of Punjab through NICNET. To provide the citizens a better service and easy reachablity State Information commission has established Video Conferencing facility in its...

Workshop on e Granthalaya held at Ranchi (Jharkhand)

Prashant Belwariar, Jharkhand prashant[dot]b[at]nic[dot]in
  |   Feb 28, 2011

A workshop on e Granthalaya software was held at Birsa Institute of Technology - Trust (BITT), Getlatu, Ranchi from 22nd to 24th Feb. 2011.  Shri Shahid Ahmad, SIO inaugurated the workshop along with Prof.(Dr.) Sudama Choubey, Director, BITT.   Speaking after inaugurating the workshop,...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...