Search

Advanced Search

Haryana - Workshop Cum Training Programme on Haryana Horticulture State Mission programme at Panchkula on 29/07/2013

Poonam Gupta, Haryana poonam[dot]g[at]nic[dot]in
  |   Aug 14, 2013
Dr. Arjun Singh Saini, Addl Director, SHM welcoming the partcipants and Smt Jyoti Singhal, Under Secretary, NHM Addresing the participants
Dr. Arjun Singh Saini, Addl Director, SHM welcoming the partcipants and Smt Jyoti Singhal, Under Secretary, NHM Addresing the participants

Q&A Session
Q&A Session

One day state level workshop cum training programme on HORTNET Software Application was organized on 29-07-2013 at Directorate of Horticulture, Sector-21, Panchkula, Haryana. The key note address was delivered by Dr.Arjun Singh Saini, Addl. Director SHM Haryana.  Smt. Jyoti Singhal, Under Secretary, National Horticulture Mission (NHM), Govt. of India, Shri Susheel Kumar, TD & Project Coordinator, NIC Haryana and Shri Rakesh Vardhan, TD and National project coordinator (Hortnet), NIC Hqrs, New Delhi also shared their views and Hortnet related experiences with the participants during and after the inaugural session.

To start with; the participants mainly the DHOs and ADIOs/DIOs  addressed  by Dr. Arjun Singh Saini followed by Smt. Jyoti Singhal and Shri Susheel Kumar by delivering the important note on Hortnet application, its importance and gaps in implementation of complete workflow. Shri Rakesh Vardhan demonstrated all components of Hortnet software application one after another i.e. Farmer registration, horticulture scheme application, application status, freezing & updation of master information etc. He also explained the complete workflow starting from registration of a farmer from any internet point , processing by block level officers and approval by district level officer through http://hortnet.gov.in, the Hortnet has inbuilt all business logics required for approvals. The session was very interactive where in Mr. Vardhan addressed all queries and doubts of participants.  The participants raised issues related to Non-CBS Bank branches  in Haryana and their master entry into the Hortnet application, Facility of registration of farmer  from non-resident  states, required validation checks in  forwarding the application to district level by Block level officer until all stages are complete, Provision of representation by a farmer in case his subsidy is re-calculated and reduced after work progress authentication, Facilitating addition of proper work stages for each scheme (poly-houses), Facility of Stage wise payments,   Removal of Break-up of component wise target fixing under SHM, Provision of a window to select a Project-NPB scheme at entry stage etc. A complete hands on session along with Q&A was organized in the post lunch session with a remarkable feedback and suggestions by the distinguished participants for significant and required improvements in the system, the session was concluded with vote of thanks to the organizers.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...