SlideShare a Scribd company logo
1 of 12
Download to read offline
Understanding Technology in e-Governance
Learning from Nemmadi, Karnataka’s 800 Telecentre Project
Kiran Jonnalagadda, Comat Technologies
kiran.j@comat.com, www.comat.com
Introducing Nemmadi
• 800 telecentres across rural Karnataka, covering all hoblis
• Deliver a range of government and private services
• Prominent service: Bhoomi land records
• Each centre occupies a commercial space the size of a small shop
• Has two computers backed with a UPS and standard peripherals
• VSAT satellite internet connectivity
The Stakeholders
• The Government of Karnataka, and
• 3i Infotech, Comat Technologies and n-Logue Communications
Your Presenter
• Works with Comat
• Manages technology for telecentre projects across India
• Technical Consultant to the State of Karnataka, on behalf of the consortium
• Has been directly involved with all aspects of technology in the project so far
Typical Technology Concerns
• What comes to mind when “technology” and “government” are considered?
• Efficiency
• Public Ownership
• Transparency of Process
• Open Source and Standards
• Reliability
• All based on context, not objective qualities of the technology itself
The Bhoomi Certificate Delivery Chain
• Several agents responsible for the technology:
• Software by National Informatics Centre (NIC)
• Platform by Microsoft
• Data Centre by Reliance
• Maintenance by CMC
• Connectivity by Hughes
• Two human agents: the telecentre operator and the customer
Peculiarity #1
• Certificates on controlled stationery
• Printing fails for various reasons. Failure not recognised by the technology
• Proof of transaction failure: presenting the wasted stationery
• Delivery chain:
• Collection from telecentre, courier agency, data entry operators,
transaction correlation software, accountants, bank credit, monthly
resolution meetings
• All for a simple shortcoming in the technology
Peculiarity #2
• Daily transaction reports, broken down by various criteria
• Oddity: sum for district is 1231, but sum for all taluks in district is 1232
• Is the reporting software flawed? More such inconsistencies surface
• Accountants poring over transactions, testing their ability to add numbers
• Months spent looking for source of inconsistency
• Eventually traced to fake test transactions with invalid values
• Question: why was the possibility of their existence not documented?
Learning
• Chain was assumed to be all machines with two human agents
• Technology was assumed to be invariably consistent in behaviour
• Turns out each link in the chain is a techno-social construct:
• A combination of machine and human agency, with related complications
• Dealing with the issues illustrated involves a new set of concerns by which to
examine the landscape
The New Concerns
• What are the points in the chain where the problem is originating?
• Who created that particular component? Who is now responsible for its
maintenance?
• Is the problem caused by a deviation from the expected behaviour of that
component? Or is the problem due to an oversight of all possible behaviours?
• In the case of the latter, does responsibility for its resolution shift to someone
else? Who is responsible for the cost of identifying and resolving this issue?
• Notice that this is rather unlike the concerns we started with. It suggests that
the examination of technology in e-governance requires a paradigm unlike
that typically used when examining technology elsewhere
Revised Concerns
• Who will be accountable for this technology?
• How do they guarantee their accountability?
• Do they have a well thought out plan?
• Does it interact well with the other agents involved?
• Do we know how to evaluate their plan?
Technology is a Social Construct.
The Significance of the Social Construct
Varies by Context
All technology involves both machine and human agency. Terms such as
“proprietary software” and “open source” both describe the social construct,
not the technology itself. The paradigm under which these terms acquired their
popular meaning may not necessarily be applicable in the context of egovernance projects.

More Related Content

What's hot

From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
Next Century Overview 2 Pager V5
Next Century Overview 2 Pager V5Next Century Overview 2 Pager V5
Next Century Overview 2 Pager V5jennhunter
 
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovTihomir Ignatov
 
Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICTAmit Singh
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
Security and privacy in Smart City Application
Security and privacy in Smart City ApplicationSecurity and privacy in Smart City Application
Security and privacy in Smart City ApplicationDhanashriNandre
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs Ahmed Banafa
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology pptAkhilesh Verma
 

What's hot (19)

From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
Intelligent Customer
Intelligent CustomerIntelligent Customer
Intelligent Customer
 
Next Century Overview 2 Pager V5
Next Century Overview 2 Pager V5Next Century Overview 2 Pager V5
Next Century Overview 2 Pager V5
 
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir IgnatovITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
ITARC Sofia 2016 - Modern Architecture - Tihomir Ignatov
 
Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICT
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
04 privacy
04 privacy04 privacy
04 privacy
 
IOT
IOTIOT
IOT
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Security and privacy in Smart City Application
Security and privacy in Smart City ApplicationSecurity and privacy in Smart City Application
Security and privacy in Smart City Application
 
Open Smart Cities in Canada V1.0 Guide
Open Smart Cities in Canada V1.0 GuideOpen Smart Cities in Canada V1.0 Guide
Open Smart Cities in Canada V1.0 Guide
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Means of ict
Means of ictMeans of ict
Means of ict
 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology ppt
 

Viewers also liked

Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Uttarakhand Open University
 
Selecting an OnDemand LMS
Selecting an OnDemand LMSSelecting an OnDemand LMS
Selecting an OnDemand LMSwillh
 
Using IT in Education
Using IT in EducationUsing IT in Education
Using IT in EducationArindam Das
 
Alberta Education Information Sessions - School Technology Services
Alberta Education Information Sessions - School Technology ServicesAlberta Education Information Sessions - School Technology Services
Alberta Education Information Sessions - School Technology ServicesAlberta Education
 
How to use information technology in education?
How to use information technology in education?How to use information technology in education?
How to use information technology in education?Kinjal Patel
 
Student Satisfaction of Learning Management Syetems
Student Satisfaction of Learning Management SyetemsStudent Satisfaction of Learning Management Syetems
Student Satisfaction of Learning Management SyetemsEvan Fondren
 
Information Technology application for Education
Information Technology application for EducationInformation Technology application for Education
Information Technology application for EducationiFour Technolab Pvt. Ltd.
 
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...Gm Morada
 
Information technology & information system lecture
Information technology & information system lectureInformation technology & information system lecture
Information technology & information system lectureNyamdorj Dugar
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technologyAmrit Banstola
 
EDUC.TECH 2 - Lesson10 : Computer As A Tutor
EDUC.TECH 2 - Lesson10 : Computer As A TutorEDUC.TECH 2 - Lesson10 : Computer As A Tutor
EDUC.TECH 2 - Lesson10 : Computer As A TutorMaria Angela Pagdagdagan
 
Quality Assurance in e-Learning by Mohamed Amin Embi
Quality Assurance in e-Learning by Mohamed Amin EmbiQuality Assurance in e-Learning by Mohamed Amin Embi
Quality Assurance in e-Learning by Mohamed Amin EmbiMohamed Amin Embi
 
Use of Information Technology in Medical Education
Use of Information Technology in Medical EducationUse of Information Technology in Medical Education
Use of Information Technology in Medical EducationIris Thiele Isip-Tan
 
Scope of ict in education
Scope of ict in educationScope of ict in education
Scope of ict in educationPriya Sush
 
ICT concept need and scope
ICT concept need and scopeICT concept need and scope
ICT concept need and scopeAtul Thakur
 
Learning Transformation & Governance
Learning Transformation & GovernanceLearning Transformation & Governance
Learning Transformation & GovernanceCharles Jennings
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technologyRimple Darra
 
e-learning governance by Mohamed Amin Embi
e-learning governance by Mohamed Amin Embie-learning governance by Mohamed Amin Embi
e-learning governance by Mohamed Amin EmbiMohamed Amin Embi
 
The importance of technology in education
The importance of technology in educationThe importance of technology in education
The importance of technology in educationCatherine Casper
 

Viewers also liked (20)

Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...
 
Selecting an OnDemand LMS
Selecting an OnDemand LMSSelecting an OnDemand LMS
Selecting an OnDemand LMS
 
Using IT in Education
Using IT in EducationUsing IT in Education
Using IT in Education
 
Alberta Education Information Sessions - School Technology Services
Alberta Education Information Sessions - School Technology ServicesAlberta Education Information Sessions - School Technology Services
Alberta Education Information Sessions - School Technology Services
 
Technology in Education
Technology in EducationTechnology in Education
Technology in Education
 
How to use information technology in education?
How to use information technology in education?How to use information technology in education?
How to use information technology in education?
 
Student Satisfaction of Learning Management Syetems
Student Satisfaction of Learning Management SyetemsStudent Satisfaction of Learning Management Syetems
Student Satisfaction of Learning Management Syetems
 
Information Technology application for Education
Information Technology application for EducationInformation Technology application for Education
Information Technology application for Education
 
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...
EDUC TECH 2 : Lesson 12 - Information Technology in Support of Student - Cent...
 
Information technology & information system lecture
Information technology & information system lectureInformation technology & information system lecture
Information technology & information system lecture
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technology
 
EDUC.TECH 2 - Lesson10 : Computer As A Tutor
EDUC.TECH 2 - Lesson10 : Computer As A TutorEDUC.TECH 2 - Lesson10 : Computer As A Tutor
EDUC.TECH 2 - Lesson10 : Computer As A Tutor
 
Quality Assurance in e-Learning by Mohamed Amin Embi
Quality Assurance in e-Learning by Mohamed Amin EmbiQuality Assurance in e-Learning by Mohamed Amin Embi
Quality Assurance in e-Learning by Mohamed Amin Embi
 
Use of Information Technology in Medical Education
Use of Information Technology in Medical EducationUse of Information Technology in Medical Education
Use of Information Technology in Medical Education
 
Scope of ict in education
Scope of ict in educationScope of ict in education
Scope of ict in education
 
ICT concept need and scope
ICT concept need and scopeICT concept need and scope
ICT concept need and scope
 
Learning Transformation & Governance
Learning Transformation & GovernanceLearning Transformation & Governance
Learning Transformation & Governance
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
e-learning governance by Mohamed Amin Embi
e-learning governance by Mohamed Amin Embie-learning governance by Mohamed Amin Embi
e-learning governance by Mohamed Amin Embi
 
The importance of technology in education
The importance of technology in educationThe importance of technology in education
The importance of technology in education
 

Similar to Understanding technology in e-governance (December 2007)

From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosMichel de Goede
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Francesco Rago
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Francesco Rago
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Megatris Comp
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Fintech Presentation By Ahsan Qureshi
Fintech Presentation By Ahsan QureshiFintech Presentation By Ahsan Qureshi
Fintech Presentation By Ahsan QureshiAhsanQureshi49
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineCognizant
 
Technological innovations in facilities management
Technological innovations in facilities managementTechnological innovations in facilities management
Technological innovations in facilities managementssuserfa7375
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...TheAnfieldGroup
 
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16AppDynamics
 
Computer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemComputer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemCity of College Station
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
RA Lecture 2 requirements analysis facilities
RA Lecture 2 requirements analysis  facilitiesRA Lecture 2 requirements analysis  facilities
RA Lecture 2 requirements analysis facilitiesLemarFrancis1
 
A model for sustainable broadband penetration in poor rural and peri-urban co...
A model for sustainable broadband penetration in poor rural and peri-urban co...A model for sustainable broadband penetration in poor rural and peri-urban co...
A model for sustainable broadband penetration in poor rural and peri-urban co...dwesaadmin
 

Similar to Understanding technology in e-governance (December 2007) (20)

From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)
 
emtech blockchain.pptx
emtech blockchain.pptxemtech blockchain.pptx
emtech blockchain.pptx
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Fintech Presentation By Ahsan Qureshi
Fintech Presentation By Ahsan QureshiFintech Presentation By Ahsan Qureshi
Fintech Presentation By Ahsan Qureshi
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural Discipline
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
 
Technological innovations in facilities management
Technological innovations in facilities managementTechnological innovations in facilities management
Technological innovations in facilities management
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
 
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16
Microservices and the Modern IT Stack: Trends of Tomorrow - AppSphere16
 
Computer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management SystemComputer-Aided Dispatch and Record Management System
Computer-Aided Dispatch and Record Management System
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
RA Lecture 2 requirements analysis facilities
RA Lecture 2 requirements analysis  facilitiesRA Lecture 2 requirements analysis  facilities
RA Lecture 2 requirements analysis facilities
 
A model for sustainable broadband penetration in poor rural and peri-urban co...
A model for sustainable broadband penetration in poor rural and peri-urban co...A model for sustainable broadband penetration in poor rural and peri-urban co...
A model for sustainable broadband penetration in poor rural and peri-urban co...
 

More from Kiran Jonnalagadda

AirJaldi photo rout (April 2008)
AirJaldi photo rout (April 2008)AirJaldi photo rout (April 2008)
AirJaldi photo rout (April 2008)Kiran Jonnalagadda
 
The medium without the message (April 2008)
The medium without the message (April 2008)The medium without the message (April 2008)
The medium without the message (April 2008)Kiran Jonnalagadda
 
Namma service cash tracking system (January 2007)
Namma service cash tracking system (January 2007)Namma service cash tracking system (January 2007)
Namma service cash tracking system (January 2007)Kiran Jonnalagadda
 
What ails the Sarai Reader List? (August 2005)
What ails the Sarai Reader List? (August 2005)What ails the Sarai Reader List? (August 2005)
What ails the Sarai Reader List? (August 2005)Kiran Jonnalagadda
 
On blogging as a career (June 2005)
On blogging as a career (June 2005)On blogging as a career (June 2005)
On blogging as a career (June 2005)Kiran Jonnalagadda
 
Python's dynamic nature (rough slides, November 2004)
Python's dynamic nature (rough slides, November 2004)Python's dynamic nature (rough slides, November 2004)
Python's dynamic nature (rough slides, November 2004)Kiran Jonnalagadda
 
Python and Zope: An introduction (May 2004)
Python and Zope: An introduction (May 2004)Python and Zope: An introduction (May 2004)
Python and Zope: An introduction (May 2004)Kiran Jonnalagadda
 
Human database relations (March 2004)
Human database relations (March 2004)Human database relations (March 2004)
Human database relations (March 2004)Kiran Jonnalagadda
 
The technology of the Human Protein Reference Database (draft, 2003)
The technology of the Human Protein Reference Database (draft, 2003)The technology of the Human Protein Reference Database (draft, 2003)
The technology of the Human Protein Reference Database (draft, 2003)Kiran Jonnalagadda
 
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Kiran Jonnalagadda
 
ZODB, the Zope Object Database (May 2003)
ZODB, the Zope Object Database (May 2003)ZODB, the Zope Object Database (May 2003)
ZODB, the Zope Object Database (May 2003)Kiran Jonnalagadda
 
Some dope on Zope (Jan 2002, Bangalore LUG)
Some dope on Zope (Jan 2002, Bangalore LUG)Some dope on Zope (Jan 2002, Bangalore LUG)
Some dope on Zope (Jan 2002, Bangalore LUG)Kiran Jonnalagadda
 
e-Governance in Karnataka: An introduction
e-Governance in Karnataka: An introductione-Governance in Karnataka: An introduction
e-Governance in Karnataka: An introductionKiran Jonnalagadda
 

More from Kiran Jonnalagadda (17)

AirJaldi photo rout (April 2008)
AirJaldi photo rout (April 2008)AirJaldi photo rout (April 2008)
AirJaldi photo rout (April 2008)
 
The medium without the message (April 2008)
The medium without the message (April 2008)The medium without the message (April 2008)
The medium without the message (April 2008)
 
Namma service cash tracking system (January 2007)
Namma service cash tracking system (January 2007)Namma service cash tracking system (January 2007)
Namma service cash tracking system (January 2007)
 
What ails the Sarai Reader List? (August 2005)
What ails the Sarai Reader List? (August 2005)What ails the Sarai Reader List? (August 2005)
What ails the Sarai Reader List? (August 2005)
 
On blogging as a career (June 2005)
On blogging as a career (June 2005)On blogging as a career (June 2005)
On blogging as a career (June 2005)
 
Python's dynamic nature (rough slides, November 2004)
Python's dynamic nature (rough slides, November 2004)Python's dynamic nature (rough slides, November 2004)
Python's dynamic nature (rough slides, November 2004)
 
Python and Zope: An introduction (May 2004)
Python and Zope: An introduction (May 2004)Python and Zope: An introduction (May 2004)
Python and Zope: An introduction (May 2004)
 
Human database relations (March 2004)
Human database relations (March 2004)Human database relations (March 2004)
Human database relations (March 2004)
 
The technology of the Human Protein Reference Database (draft, 2003)
The technology of the Human Protein Reference Database (draft, 2003)The technology of the Human Protein Reference Database (draft, 2003)
The technology of the Human Protein Reference Database (draft, 2003)
 
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
 
ZODB, the Zope Object Database (May 2003)
ZODB, the Zope Object Database (May 2003)ZODB, the Zope Object Database (May 2003)
ZODB, the Zope Object Database (May 2003)
 
XML-RPC and SOAP (April 2003)
XML-RPC and SOAP (April 2003)XML-RPC and SOAP (April 2003)
XML-RPC and SOAP (April 2003)
 
Some dope on Zope (Jan 2002, Bangalore LUG)
Some dope on Zope (Jan 2002, Bangalore LUG)Some dope on Zope (Jan 2002, Bangalore LUG)
Some dope on Zope (Jan 2002, Bangalore LUG)
 
User Management with LastUser
User Management with LastUserUser Management with LastUser
User Management with LastUser
 
Sustainability and bit-rot
Sustainability and bit-rotSustainability and bit-rot
Sustainability and bit-rot
 
e-Governance in Karnataka: An introduction
e-Governance in Karnataka: An introductione-Governance in Karnataka: An introduction
e-Governance in Karnataka: An introduction
 
Cyberpunk Sci-Fi
Cyberpunk Sci-FiCyberpunk Sci-Fi
Cyberpunk Sci-Fi
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Understanding technology in e-governance (December 2007)

  • 1. Understanding Technology in e-Governance Learning from Nemmadi, Karnataka’s 800 Telecentre Project Kiran Jonnalagadda, Comat Technologies kiran.j@comat.com, www.comat.com
  • 2. Introducing Nemmadi • 800 telecentres across rural Karnataka, covering all hoblis • Deliver a range of government and private services • Prominent service: Bhoomi land records • Each centre occupies a commercial space the size of a small shop • Has two computers backed with a UPS and standard peripherals • VSAT satellite internet connectivity
  • 3. The Stakeholders • The Government of Karnataka, and • 3i Infotech, Comat Technologies and n-Logue Communications
  • 4. Your Presenter • Works with Comat • Manages technology for telecentre projects across India • Technical Consultant to the State of Karnataka, on behalf of the consortium • Has been directly involved with all aspects of technology in the project so far
  • 5. Typical Technology Concerns • What comes to mind when “technology” and “government” are considered? • Efficiency • Public Ownership • Transparency of Process • Open Source and Standards • Reliability • All based on context, not objective qualities of the technology itself
  • 6. The Bhoomi Certificate Delivery Chain • Several agents responsible for the technology: • Software by National Informatics Centre (NIC) • Platform by Microsoft • Data Centre by Reliance • Maintenance by CMC • Connectivity by Hughes • Two human agents: the telecentre operator and the customer
  • 7. Peculiarity #1 • Certificates on controlled stationery • Printing fails for various reasons. Failure not recognised by the technology • Proof of transaction failure: presenting the wasted stationery • Delivery chain: • Collection from telecentre, courier agency, data entry operators, transaction correlation software, accountants, bank credit, monthly resolution meetings • All for a simple shortcoming in the technology
  • 8. Peculiarity #2 • Daily transaction reports, broken down by various criteria • Oddity: sum for district is 1231, but sum for all taluks in district is 1232 • Is the reporting software flawed? More such inconsistencies surface • Accountants poring over transactions, testing their ability to add numbers • Months spent looking for source of inconsistency • Eventually traced to fake test transactions with invalid values • Question: why was the possibility of their existence not documented?
  • 9. Learning • Chain was assumed to be all machines with two human agents • Technology was assumed to be invariably consistent in behaviour • Turns out each link in the chain is a techno-social construct: • A combination of machine and human agency, with related complications • Dealing with the issues illustrated involves a new set of concerns by which to examine the landscape
  • 10. The New Concerns • What are the points in the chain where the problem is originating? • Who created that particular component? Who is now responsible for its maintenance? • Is the problem caused by a deviation from the expected behaviour of that component? Or is the problem due to an oversight of all possible behaviours? • In the case of the latter, does responsibility for its resolution shift to someone else? Who is responsible for the cost of identifying and resolving this issue? • Notice that this is rather unlike the concerns we started with. It suggests that the examination of technology in e-governance requires a paradigm unlike that typically used when examining technology elsewhere
  • 11. Revised Concerns • Who will be accountable for this technology? • How do they guarantee their accountability? • Do they have a well thought out plan? • Does it interact well with the other agents involved? • Do we know how to evaluate their plan?
  • 12. Technology is a Social Construct. The Significance of the Social Construct Varies by Context All technology involves both machine and human agency. Terms such as “proprietary software” and “open source” both describe the social construct, not the technology itself. The paradigm under which these terms acquired their popular meaning may not necessarily be applicable in the context of egovernance projects.