Search

Advanced Search

WORKSHOP on eMAMTA organized in Punjab

Vikram Jeet Grover, Punjab grover[dot]vikram[at]nic[dot]in
  |   Nov 16, 2010
Sh.Gurdev Singh PSA demonstrating MCTS application in the workshop.
Sh.Gurdev Singh PSA demonstrating MCTS application in the workshop.

For effective implementation of Mother and Child Tracking System MCTS under eMamta project in Punjab, a workshop-cum-training was organized by National Rural Health Mission NRHM Punjab with the support of NIC Punjab from 10 Nov to 12 Nov 2010 in the Conference Hall of Parivar Kalyan Bhawan,Chandigarh.  The one day workshop was organized on three consecutive days in three separate batches comprising of District Family and Welfare Officers, District Programme Officer and District Monitoring and Evaluation officer from from all the districts. DIOs from all the districts of Punjab with respective NRHM officers, also participated in the workshop. Sh Vikram Jeet Grover TD and Sh.Gurdev Singh PSA  from NIC Punjab also attended the workshop.

 

In his welcome speech, Dr Ashok Nayyar Director Health and Family Welfare,Govt Of Punjab gave introduction to the MCTS Programme and its importance in delivery of health services. Sh Gulshan Kumar Deputy Director Statistics Directorate of Health Services Govt. Of Punjab explained the objectives of MCTS to the participants. He also explained the 80 column format of NRHM for MCTS to the participants.

 

Sh Satish Chandra, IAS Principal Secretary Health Govt Of Punjab also attended one session in which he interacted with the participants and explained the importance, need and urgency of implementation of MCTS. He also urged the participants to ensure its successful launch in Punjab from 1 Dec 2010.

 

The workshop was conducted by Sh.Gurdev Singh PSA NIC Punjab in which  in different sessions, he demonstrated the MCTS application in detail covering the preparation of various masters including common masters including procedure to add villages not available in Census 2011 data and explained the importance of accuracy in creating Masters for correct data entry and reporting. The procedure for online data entry on MCTS application for Pregnant women, temporary migrated pregnant mother and Child registration and immunization was demonstrated in detail. Generation of Work plans and various reports based on different parameters was also shown. The Monitoring and Evaluation Officers were given hands on time on the application for verifying their understanding on the concepts and work flow of the application.

                          

The last QandA session of the workshop was devoted to queries and doubts  in which all the issues of the participants were taken up and answered  jointly by Punjab Health department and NIC.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...