Search

Advanced Search

Live Phone-in programme telecasted over DD National (Odia)

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Apr 23, 2013
Panel during the Phone-in programme
Panel during the Phone-in programme

Shri Nihar Ranjan Biswal, PSA, NIC discussing on various features of eAuction
Shri Nihar Ranjan Biswal, PSA, NIC discussing on various features of eAuction

Government of Odisha has decided to issue licenses of IMFL (Indian Made Foreign Liquor) off shops and CS (Country Spirit) shops under Excise department through the process of eAuction for which NIC has been entrusted the responsibility to provide the software platform.

As a part of the change management initiative the Live Phone-in programme has been telecasted in DD National (Odia) channel on 18th April 2013 from 5.02 pm to 5.30 pm. The objective of this programme was to enable the prospective bidders to ask various questions over phone and get their doubts clarified. Along with that the detailed discussions were carried out by the panel to address various frequently raised issues.

The expert panel was consisting of Shri Biswar Kumar Nayak, IAS, Excise Commissioner, representing Excise department, Govt. of Odisha, Shri Nihar Ranjan Biswal, PSA, representing NIC, Odisha, GOI and Er. Trinath Kumar Behera, DGM, representing State e-Procurement Cell, GOO.

Bidders, from throughout the State, Participated in the live interactive programme making the project achieving its wider objective of reaching to masses.

The interaction was very lively and informative. Shri S.P.Thakur, IAS, Principal Secretary to Govt., Excise Department expressed his satisfaction over the deliberations & interactions. Shri S. K. Panda, DDG & SIO, NIC, Odisha congratulated the team for taking up such innovative initiative and taking the project further.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...