Search

Advanced Search

News

Showing 11 to 15 of 1450 records

Capacity Building under eCourt Phase III: Technical Training for High Court of Orissa Staff

Jayanta Kumar Mishra, Odisha jkmishra[at]nic[dot]in
  |   Mar 23, 2025

A two-day technical training programme was successfully conducted for the technical staff of the High Court of Orissa under the eCourt Phase III Capacity-Building Programme, aimed at enhancing their technical proficiency and operational efficiency. The training, designed by the Hon’ble eCommittee...

Launch of Cashless Treatment Scheme and UT-Level eDAR Workshop in Puducherry

K.Mohan, Pondicherry mohanabi[at]nic[dot]in
  |   Mar 20, 2025

The Government of Puducherry, in collaboration with the Police Department, organized a UT-level workshop on the Integrated Road Accident Database (iRAD)/eDAR platform on 20th March 2025 at Puducherry. The workshop also witnessed the official launch of the Cashless Treatment Scheme for Road Accident...

Workshop on Integrated MIS Portal for Welfare Schemes, Utility Services Portal, DARPAN Dashboard, and Cyber Security

N.S.Kumaran, Pondicherry ns[dot]kumaran[at]nic[dot]in
  |   Mar 20, 2025

NIC Puducherry designed and developed an Integrated MIS Portal for welfare schemes of Government of Puducherry. On this, a workshop was held at the Regional Administrator's Office at Yanam, Puducherry UT on 20-03-2025. During the session, Sh. N.S. Kumaran, Sr. Director(IT), NIC Puducherry provided...

Visit of SIO Telangana to NIC District Centre, Nalgonda

Raynil John, Telangana raynil[dot]john[at]nic[dot]in
  |   Mar 18, 2025

Shri Guntuku Prasad, Senior Director (IT) & State Informatics Officer (SIO), Telangana, visited the NIC District Centre, Nalgonda on March 18, 2025. He was accompanied by Shri Raynil John, Senior Director (IT) & Additional SIO (Districts), and Shri S. Krishna, Senior Director (IT) and Head...

As part of the Honorable Prime Minister of India visit to Dadra & Nagar Haveli for the inauguration of the NAMO Medical Education and Research Institute and NAMO Hospital on 7th March 2025, NIC provided end-to-end technical support in coordination with the UT Administration and in accordance with...

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...