Search

Advanced Search

GePNIC Launched for PWD Punjab

Vikram Jeet Grover, Punjab grover[dot]vikram[at]nic[dot]in
  |   Jul 14, 2010
Secy PWD publishing First Tender of PWD on GePNIC
Secy PWD publishing First Tender of PWD on GePNIC

GePNIC (Government eProcurement System of NIC-GePNIC) system was launched by Sh.Kulbir Singh, IAS Secretary (PWD) Govt of Punjab in an official function at Punjab Bhawan Chandigarh on 12th July 2010. On the occasion, Secretary(PWD) formally published first tender on the website. The launch has paved the way for automation of tender processing in the department that is involved in number of works across the state.

The function was graced by all the senior officers of PWD comprising of Sh.Yogesh Gupta, Joint Secretary (Punjab Roads and Bridges Development Board (PRBDB), Chief Engineers, Superintending Engineer, Executive Engineers, General Manager(IT) PRBDB among others. Secretary (PWD) lauded the role of NIC in establishing GePNIC system for PWD and putting up their efforts in guiding the department, organizing the trainings and to make it operational in a short time. He highlighted the need for automated system for tendering process in current times and urged the officers for its implementation in other projects also. From NIC, Sh.Navneet Kukreja SIO, Sh.K.S.Raghavan SrTD Chennai, Sh.Vikram Jeet Grover TD, Sh.Anoop Jalali PSA attended the ceremony.

The launch was followed by discussions and QandA session in which the officers raised varied issues like disaster recovery system, security etc apart from suggestions for the enhancement of GePNIC. Sh.Raghavan apprised the officers about proliferation of GePNIC installations and about its future plans and assured that their genuine suggestions shall be considered for incorporation in due course of time.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...