Search

Advanced Search

Chandigarh UT - Launch of "Reservation Roster Management System" by Adviser to the Administrator UT Chandigarh on 22nd October 2020

Vivek Verma, Chandigarh vivek[dot]verma[at]nic[dot]in
  |   Oct 27, 2020
Sh. Manoj Parida, IAS Adviser to the  Administrator UT Chandigarh launching Reservation Roster Management System
Sh. Manoj Parida, IAS Adviser to the Administrator UT Chandigarh launching Reservation Roster Management System

Sh. Manoj Parida, IAS Adviser to the  Administrator UT Chandigarh interacting with officers after  launching Reservation Roster Management System
Sh. Manoj Parida, IAS Adviser to the Administrator UT Chandigarh interacting with officers after launching Reservation Roster Management System

Adviser to the Administrator Sh. Manoj Parida, IAS launched “Reservation Roster Management System” on 22nd October 2020 developed by NIC for Personnel and Social Welfare Departments of Administration, at UT Secretariat in the presence of senior UT officers.  Secretary Personnel, Sh. S.K. Jha briefed about the features of the system which include allowing the HODs to monitor on their dashboards the real time category-wise vacancy position of SC/OBC, sending automated quarterly alerts to the Branch In-charges to update the information. Earlier on 2nd  July, 2020, Hon’ble Punjab Governor and UT Administrator Sh. V.P. Singh Badnore had launched “Recruitment Rules and Vacancy Management System” which provided the information gap related to updation of Recruitment Rules and vacancies. The Reservation Roster Management System completes this process for filling up the vacancies as also the roster required for promotion in future by giving category-wise vacancy.  This will help the departments to fill up the vacancies for both direct entries and promotions expeditiously. Filling up the vacancies will also improve the quality of delivery of administration. Timely information will improve the employee satisfaction.  It is important to note that because of the decision regarding retirement earlier this year relatively larger numbers of employees have retired from the service this year.  The system will also provide timely reminders to the HODs to take action so that the posts do not lapse after two years of remaining vacant. This will also help the cadre management in various cadres.     The Adviser to the Administrator congratulated the Personnel Department, Social Welfare Department and NIC for taking innovative measures to further streamline the administrative machinery.  He appreciated this effort to bring administrative efficiency as also transparency in the system.  He wanted the features of the software to be utilised enthusiastically by all the HODs by taking a holistic view to streamline the administrative machinery.  

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...