Search

Advanced Search

Workshop on e-Procurement held at Ranchi, Jharkhand

informatics, NIC-HQ editor[dot]info[at]nic[dot]in
  |   Nov 20, 2009
(Work Shop on e-Procurement at Ranchi)
(Work Shop on e-Procurement at Ranchi)

The tendering process adopted by various government departments for awarding work contracts or even to obtain goods, services etc. in the state is set for a major change with the showcasing of “e-Procurement Software” of NIC. To begin with the “Jharkhand State Rural Road Department Agency”, a nodal organization under the Rural Development Department, Govt. of Jharkhand and responsible for constructing rural roads throughout the state under the national scheme – PMGSY, has decided to transform its tendering process with the adoption of e-Procurement Software, which has already been adopted by many states in the first phase.
To acquaint the officials and the bidders alike about the software, NIC in association with the Rural Development Department organized a workshop on e-Procurement between 6th & 8th November 2009 at the ViSWA, Training Centre, Kanke, Ranchi. The workshop, inaugurated by Shri Jai Prakash, Engineer-in-Chief in the presence of Shri Shahid Ahmad, State Informatics Officer, and other senior government officials may herald the beginning of a new dawn in a resource rich state like Jharkhand. The intricacies of the software which will be implemented through Internet was explained along with the live demonstration by Shri A K Hota, Technical Director and Shri Ganesh Khadinga, Principal Systems Analyst both NIC experts on the subject. The process of tender creation by the department, uploading it on the site, defining various dates along with the cost –benefit analysis were explained in detail.
Shri S.K.Satpathy, Secretary, Rural Development who addressed the participants on the concluding day observed that problems related to tenders like cartel formation etc, will be curbed while the new system will promote transparency along with higher competition. He declared that his department is going to implement the e-Procurement system in the state from the New Year for all the tenders that will be floated by the department. The workshop ended with vote of thanks by Shri Loukesh Kumar, Technical Director and State Coordinator of the project

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...