Search

Advanced Search

Cabinet Secretariat Initiative - e-PMS Launched for Assam on 14th July 2014 CS, Assam

Dr. Shubhag Chand, Delhi shubhag[at]nic[dot]in
  |   Jul 16, 2014
During launching of e-PMS Portal for Assam, Mr. Jitesh Khosla, Chief Secretary, Govt. of Assam  addressing the audience
During launching of e-PMS Portal for Assam, Mr. Jitesh Khosla, Chief Secretary, Govt. of Assam addressing the audience

During launching of e-PMS Portal for Assam, Dr. Shubhag Chand, HOD, Cabinet Secretariat Informatics Centre,Cabinet Secretariat addressing the audience
During launching of e-PMS Portal for Assam, Dr. Shubhag Chand, HOD, Cabinet Secretariat Informatics Centre,Cabinet Secretariat addressing the audience

 Mr. Jitesh Khosla, Chief Secretary, Govt. of Assam launched the State Level web portal ‘Online Projects Management System’ for Assam on Monday, 14th July 2014, at Chief Secretariat after Jharkhand, Odisha, Uttarakhand, Kerala, Chhattisgarh, Uttar Pradesh, Himachal Pradesh, Karnataka, Maharashtra and Puducherry. e-PMS, an online Projects Management System developed and managed by NIC, Cabinet Secretariat Informatics Division, Cabinet Secretariat, for fast-tracking industrial and infrastructure projects with investments in the range of Rs 100 to Rs 1,000 crore.

Speaking on the occasion of, Anil Swarup, Additional Secretary and Chairman of the Project Monitoring Group, Cabinet Secretariat, Govt. of India “industries can upload their problems and grievances on the portal at both the Central and state government level and their issues would be addressed on priority”

The portals of the states and the Central PMG are connected. So once a developer registers with the state PMG, all state-related issues are sent to nodal officers there, while those relating to the Centre immediately come to the Central PMG. Industries get the immediate response from the automatic mailer and they can see the current status of concerned projects through this platform immediately after the subgroup meeting is over if the decision being entered online.

This would include submission of a new project, editing/updating the projects, reviewing the projects, submission of details relating to bottlenecks. It also includes preparation of Agenda that can be generated online and circulated with auto mailer to all the Nodal Officers, Secretary to Departments and Invitees with their name. So it is mandatory to update contact details in the master database by the admin user. Similar to the agenda preparation, Minutes of the meetings can be generated and circulated online just after the meeting if decision taken by the subgroup is being entered online to the system. System also provides various Graphical Analysis, Reports, and Investment Monitoring module.

Giving a brief presentation on the e-PMS system, Shubhag Chand, Head of Department, Cabinet Secretariat, Information Division, said industry members can use the online solution for any bottleneck the industries are facing during the implementation stage, it would provide assistance in generation of MIS reports such as graphical reports, financial reports and tracking of actual investment for the projects entered in the system.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...