Search

Advanced Search

News

Showing 1456 to 1460 of 1465 records

5 day Training Program under e-Courts Project held for Systems Officers of J&K at Jammu

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   Feb 24, 2009

" A 5-day Training Program under e-Courts project was held for the newly selected Systems Officers of J&K from 16th to 20th of February 2009 at the High Court of J&K Judicial Academy, Jammu. In all, 22 Systems Officers for the 22 districts of J&K and 2 Senior Systems Officers selected for High Court,...

State Level Workshop on Plan Plus conducted at NIC Uttarakhand during 18th-19th February 2009

Rajesh Goyal, Uttaranchal rajesh[dot]goyal[at]nic[dot]in
  |   Feb 24, 2009

"Two days State Level workshop on web-based Plan-Plus Software (Backward Region Grant Fund-BRGF) has been conducted by NIC Uttarakhand State Unit at Uttarakhand Institute of Rural Development, Rudrapur during 18th-19th February 2009. The purpose of this workshop was to train the district level officers...

eGazette Project of Himachal Pradesh wins National eGovernance Award

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Feb 20, 2009

"The eGazette initiative of the Himachal Pradesh Government has won the Bronze Icon Award under Category I-Excellence in Government Process Reengineering in the National eGovernance Conference held in Goa on 12th and 13th of February 2008. The Awards were presented by the Hon’ble Governor of Goa, Sh....

National eGovernance Award for Himachal Pradesh Police Web-portal

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Feb 20, 2009

"The HIMPOL project of Himachal Pradesh Police designed and developed by the NIC has won the Bronze Icon Award under Outstanding Performance in Citizen Centric Delivery category in the 12th eGovernance Conference at Goa on 12th and 13th of February 2009. The IG, Police and SIO, NIC HP received the Award....

Asian Development Bank(ADB) representatives reviewed e-Procurement rollout in Orissa

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Feb 10, 2009

"NIC Orissa recently hosted the ADB team’s visit at Bhubaneswar regarding review of system compliance of e-procurement software and it’s implementation. NIC Orissa successfully implemented the Mission Mode e-procurement project across Orissa in various departments. Various MDBs (Multi Donor...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...