Search

Advanced Search

Workshop on eProcurement (GePNIC) in Shimla Himachal Pradesh

Dharmesh Kumar, Himachal Pradesh dharmesh[dot]sharma[at]nic[dot]in
  |   Jan 24, 2011
Demonstration on GePNIC
Demonstration on GePNIC

Consequent upon request from the state government to implement eProcurement in three major departments namely Public Works Department, Irrigation and Public Health and Industry after successful implementation under PMGSY Project, a three day workshop cum training session was conducted during 20-22nd Jan 2011 at Himachal Institute of Public Administration (HIPA). Senior Officers from all the three departments were trained for two days and last day was devoted to the training of the bidders.

On 20th Jan 2011, the workshop started with a general introduction to the system followed by a demonstration related to bid creation and uploading by Sh S Raghvan K, Sr. Technical Director and Sh Selvan, PSA NIC Chennai. Various queries raised by various participants were taken and answered too. The post lunch session was devoted to hands on practice and all the officers were able to create tender and upload the same successfully.

On 21st Jan 2011, a demonstration on opening of technical Bid, Technical Evaluation, opening of Financial Bid and financial evaluation was conducted. The demonstration ended with demonstration on Award of Contract. A hand on session was conducted in the post lunch session which was well received by the participants. In concluding session, the Officers were informed about the modus operandi which is being followed in Himachal Pradesh for its implementation by Sh Mukesh K Ralli, Technical Director and Sh Bharat Kaushal, System Analyst NIC Himachal Pradesh. State Informatics Officer & Senior Technical Director Sh Rajesh Bahadur explained the efforts being undertaken in the computerisation of PWD and I&PH Departments and requested all the participants to practice on the demo site of eProcurement so that they may come out with suggestions related to the customization of the software.

Contractors/bidders being the important stakeholders, an exclusive training was conducted for them on 22nd Jan. wherein the 22 bidders  from each three departments participated and showed keen interest in the demonstration. A complete demonstration on bidder registration process and bid submission was conducted by Sh S Raghvan and Sh Selvan assisted by Mukesh K Ralli and Sh Bharat Kaushal.

The bidders were also apprised about the usefulness of the software and advantages occurring after its implementation. They were advised to apply for Digital Signature Certificates and process of obtaining the certificate was also explained to them. They were also advised that they should practice on demo site and come out with suggestion. In order to enhance their understanding they were put on to hands on training. Many of the bidders were able to register themselves and were also able to upload the bids.

The training was a great success as more than 100% participation was observed in the presence of the officers and bidders.

 

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...