Search

Advanced Search

Goa Shipyard Limited under the Ministry of Defence, Govt of India became the latest PSU member to adopt GePNIC URL- http://eprocuregsl.gov.in

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Jan 10, 2012
CMD inaugurating the portal
CMD inaugurating the portal

The Team which make it a success
The Team which make it a success

With the launch of the portal on 29th December 2011, Goa Shipyard Limited under the Ministry of Defence, Govt of India, became the latest PSU member to adopt GePNIC. Chairman-cum-Managing Director Rear Admiral (Retd) Vineet Bakhshi formally inaugurated the portal in a function at GSL, Goa in presence of all Directors, senior officers and Shri M. Manivannan, STD, NIC Chennai.

During his brief speech the CMD appreciated the efforts put in by both GSL & NIC teams to bring e-tendering to a shape for GSL in a short span of time.

Shri Manivannan, STD highlighted the journey so far for GePNIC and assured GSL all technical support in the rollout phase.
NIC Odisha eProcurement team comprising Shri Tapan Prakash Ray, TD & Shri Nihar Ranjan Biswal, PSA along with  Shri J. S. Rozario, PSA, NIC Goa, provided all technical support including training to bidders for the successful hosting of pilot tenders.

Shri Kalaiyarasan , DGM (System) and Shri Anthony Jegraj, Retd. CGM and Consultant, GSL coordinated the event.

It may be recalled that the Shri S.K.Panda, STD –cum- SIO Odisha and  Shri A. K. Hota, Technical Director had conducted the sensitization programme-cum-workshop at GSL, Goa, during the 2nd week of December to set the ball rolling for speedy implementation of GePNIC. Thereafter Shri Anthony Jegraj, visited NIC Odisha and NIC Chennai offices to expedite the process to make the site ready at the least possible time. 
- e-Procurement team NIC, Odisha
 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...