Search

Advanced Search

A 3 days long training- cum -awareness programme for bidders of OFDC at NIC Bhubaneswar

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jul 18, 2013
Bidders participating in the workshop
Bidders participating in the workshop

Total 83 bidders participated
Total 83 bidders participated

Orissa Forest Development Corporation, a Government of Odisha Undertaking under the Forest & Environment Department, has decided to invite on line bids to sell the Kendu leaves through eProcurement mode using GePNIC. After successful workshop for departmental officers of OFDC in June 2013, a 3 days training cum awareness programme was organized for the bidders of OFDC at NIC Bhubaneswar. It was attended by bidders dealing with Kendu leaves from Odisha as well as neighbouring states.

 Shri A. K. Hota, Sr. Technical Director NIC Odisha gave the welcome address while  Shri Tapan Prakash Ray, TD and Shri Nihar Ranjan Biswal, PSA carried out presentations on the first day. Thereafter the training was conducted in 6 different batches spanning 3 days by Shri Nalini Kanta Das, Sr Consultant, State Procurement Cell, Shri Dijak Sahu, Sr Programmer, Shri Saikh Imtiyaj, Operations Manager and Shri Sunil Kumar Parida, Operations Manager.

  Bidders were demonstrated the portal registration process and on line bid submission process using GePNIC. They were also explained about Digital Signature Certificate and its use. Queries from bidders were answered promptly by the team. Total 83 bidders   participated in the workshop. OFDC has planned to host their fist tender during 1st week of August.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...