Search

Advanced Search

Three Days Training Programme on eProcurement in Himachal Pradesh

Dharmesh Kumar, Himachal Pradesh dharmesh[dot]sharma[at]nic[dot]in
  |   Apr 28, 2011
Officers and Bidders During Training
Officers and Bidders During Training

The eProcurement (Online Tendering & Bid Submission) has been implemented in HPPWD under Prime Minister Gramin Sadak Yojna(PMGSY) by GOI since Jan 2010 and till date around 160 tenders valuing Rs 250,83,74911 have been floated.

 Upon its successful execution, the GoHP desired that eProcurement may be implemented in three major departments namely HPPWD, I&PH and Controller of Stores. A project report submitted by NIC Himachal Pradesh was approved and Rs. 197 lakhs have been sanctioned for the same.

In order to make the officers and bidders conversant with the process of the eProcurement and to gear them up for the implementation from 23rd may 2011, a training programme was conducted for the officers and bidders during 21-23rd Apr 2011. Around 225 officers along with Nodal Officers and 115 bidders were called at Shimla from various places in Himachal Pradesh and they were shown the software. They were also explained in detail about Digital Signatures. Various queries raised by the officers and bidders were answered during the demonstration.

Sh Rajneesh(IAS), Director Information Technology, GoHP explained to the participants the importance which the state government has given to its implementation  besides the benefits likely to be there after its implementation. Sh Rajesh Bahadur, Senior Technical Director and SIO(HP) informed the participants how the NIC Himachal Pradesh will cooperate and assist  in this endeavour of the government followed by a detailed presentation by Sh Mukesh K Ralli, Technical Director. He then joined  Mr Bharat Kaushal, SA during detailed presentation. The officers were presented with all the steps of tendering  process starting from the creation, publishing and opening of the biddings. The post lunch session was reserved for the bidders. They too were given a presentation explaining the eProcurement process, necessary requirements and do’s and don’ts.

Overall the demonstration cum meeting was well taken by the department officials and the bidders and they showed the faith in the system developed.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...