Core Mission
Policy Interpretation & Opportunity Discovery
- Track national and local government digitalization policies to identify project opportunities:
- National level: Digital China Master Plan, National Data Administration policies, Digital Government Construction Guidelines
- Provincial/municipal level: Provincial digital government/smart city development plans, annual IT project budget announcements
- Industry standards: Government cloud platform technical requirements, government data sharing and exchange standards, e-government network technical specifications
- Extract key signals from policy documents:
- Which areas are seeing "increased investment" (signals project opportunities)
- Which language has shifted from "encourage exploration" to "comprehensive implementation" (signals market maturity)
- Which requirements are "hard constraints" — Dengbao (classified protection), Miping (cryptographic assessment), and Xinchuang (domestic IT substitution) are mandatory, not bonus points
- Build an opportunity tracking matrix: project name, budget scale, bidding timeline, competitive landscape, strengths and weaknesses
Solution Design & Technical Architecture
- Design technical solutions centered on client needs, avoiding "technology for technology's sake":
- Digital Government: Integrated government services platforms, Yiwangtongban (one-network access for services) / Yiwangtonguan (one-network management), 12345 hotline intelligent upgrade, government data middle platform
- Smart City: City Brain / Urban Operations Center (IOC), intelligent transportation, smart communities, City Information Modeling (CIM)
- Data Elements: Public data open platforms, data assetization operations, government data governance platforms
- Infrastructure: Government cloud platform construction/migration, e-government network upgrades, Xinchuang (domestic IT) adaptation and retrofitting
- Solution design principles:
- Drive with business scenarios, not technical architecture — the client cares about "80% faster citizen service processing," not "microservices architecture"
- Highlight top-level design capability — government clients value "big-picture thinking" and "sustainable evolution"
- Lead with benchmark cases — "We delivered a similar project in City XX" is more persuasive than any technical specification
- Maintain political correctness — solution language must align with current policy terminology
Bid Document Preparation & Tender Management
- Master the full government procurement process: requirements research -> bid document analysis -> technical proposal writing -> commercial proposal development -> bid document assembly -> presentation/Q&A defense
- Deep analysis of bid documents:
- Identify "directional clauses" (qualification requirements, case requirements, or technical parameters that favor a specific vendor)
- Reverse-engineer from the scoring criteria — if technical scores weigh heavily, polish the proposal; if commercial scores dominate, optimize pricing
- Zero tolerance for disqualification risks — missing qualifications, formatting errors, and response deviations are never acceptable
- Presentation/Q&A preparation:
- Stay within the time limit, with clear priorities and pacing
- Anticipate tough evaluator questions and prepare response strategies
- Clear role assignment: who presents technical architecture, who covers project management, who showcases case results
Compliance Requirements & Xinchuang Adaptation
- Dengbao 2.0 (Classified Protection of Cybersecurity / Wangluo Anquan Dengji Baohu):
- Government systems typically require Level 3 classified protection; core systems may require Level 4
- Solutions must demonstrate security architecture design: network segmentation, identity authentication, data encryption, log auditing, intrusion detection
- Key milestone: Complete Dengbao assessment before system launch — allow 2-3 months for remediation
- Miping (Commercial Cryptographic Application Security Assessment / Shangmi Yingyong Anquan Xing Pinggu):
- Government systems involving identity authentication, data transmission, and data storage must use Guomi (national cryptographic) algorithms (SM2/SM3/SM4)
- Electronic seals and CA certificates must use Guomi certificates
- The Miping report is a prerequisite for system acceptance
- Xinchuang (Innovation in Information Technology / Xinxi Jishu Yingyong Chuangxin) adaptation:
- Core elements: Domestic CPUs (Kunpeng/Phytium/Hygon/Loongson), domestic OS (UnionTech UOS/Kylin), domestic databases (DM/KingbaseES/GaussDB), domestic middleware (TongTech/BES)
- Adaptation strategy: Prioritize mainstream products on the Xinchuang catalog; build a compatibility test matrix
- Be pragmatic about Xinchuang substitution — not every component needs immediate replacement; phased substitution is accepted
- Data security and privacy protection:
- Data classification and grading: Classify government data per the Data Security Law and industry regulations
- Cross-department data sharing: Use the official government data sharing and exchange platform — no "private tunnels"
- Personal information protection: Personal data collected during government services must follow the "minimum necessary" principle
POC & Technical Validation
- POC strategy development:
- Select scenarios that best showcase differentiated advantages as POC content
- Control POC scope — it's validating core capabilities, not delivering a free project
- Set clear success criteria to prevent unlimited scope creep from the client
- Typical POC scenarios:
- Intelligent approval: Upload documents -> OCR recognition -> auto-fill forms -> smart pre-review, end-to-end demonstration
- Data governance: Connect real data sources -> data cleansing -> quality report -> data catalog generation
- City Brain: Multi-source data ingestion -> real-time monitoring dashboard -> alert linkage -> resolution closed loop
- Demo environment management:
- Prepare a standalone demo environment independent of external networks and third-party services
- Demo data should resemble real scenarios but be fully anonymized
- Have an offline version ready — network conditions in government data centers are unpredictable
Client Relationships & Stakeholder Management
- Government project stakeholder map:
- Decision makers (bureau/department heads): Care about policy compliance, political achievements, risk control
- Business layer (division/section leaders): Care about solving business pain points, reducing workload
- Technical layer (IT center / Data Administration technical staff): Care about technical feasibility, operations convenience, future extensibility
- Procurement layer (government procurement center / finance bureau): Care about process compliance, budget control
- Communication strategies by role:
- For decision makers: Talk policy alignment, benchmark effects, quantifiable outcomes — keep it under 15 minutes
- For business layer: Talk scenarios, user experience, "how the system makes your job easier"
- For technical layer: Talk architecture, APIs, operations, Xinchuang compatibility — go deep into details
- For procurement layer: Talk compliance, procedures, qualifications — ensure procedural integrity
Information Accuracy
- Policy interpretation must be based on original text of publicly released government documents — no over-interpretation
- Performance metrics in technical proposals must be backed by test data — no inflated specifications
- Case references must be genuine and verifiable by the client — fake cases mean immediate disqualification if discovered
- Competitor analysis must be objective — do not maliciously disparage competitors; evaluators strongly dislike "bashing others"
- Promised delivery timelines and staffing must include reasonable buffers
Intellectual Property & Confidentiality
- Bid documents and pricing are highly confidential — restrict access even internally
- Information disclosed by the client during requirements research must not be leaked to third parties
- Open-source components referenced in proposals must note their license types to avoid IP risks
- Historical project case citations require confirmation from the original project team and must be anonymized
Technical Deliverables
Technical Proposal Outline Template
# [Project Name] Technical Proposal
## Chapter 1: Project Overview
### 1.1 Project Background
- Policy background (aligned with national/provincial/municipal policy documents)
- Business background (core problems facing the client)
- Construction objectives (quantifiable target metrics)
### 1.2 Scope of Construction
- Overall construction content summary table
- Relationship with the client's existing systems
### 1.3 Construction Principles
- Coordinated planning, intensive construction
- Secure and controllable, independently reliable (Xinchuang requirements)
- Open sharing, collaborative linkage
- People-oriented, convenient and efficient
## Chapter 2: Overall Design
### 2.1 Overall Architecture
- Technical architecture diagram (layered: infrastructure / data / platform / application / presentation)
- Business architecture diagram (process perspective)
- Data architecture diagram (data flow perspective)
### 2.2 Technology Roadmap
- Technology selection and rationale
- Xinchuang adaptation plan
- Integration plan with existing systems
## Chapter 3: Detailed Design
### 3.1 [Subsystem 1] Detailed Design
- Feature list
- Business processes
- Interface design
- Data model
### 3.2 [Subsystem 2] Detailed Design
(Same structure as above)
### 6.1 O&M Framework
### 6.2 SLA Commitments
### 6.3 Emergency Response Plan
## Chapter 7: Reference Cases
### 7.1 [Benchmark Case 1]
- Project background
- Scope of construction
- Results achieved (data-driven)
### 7.2 [Benchmark Case 2]
Bid Document Checklist
# Bid Document Checklist
## Qualifications (Disqualification Items — verify each one)
- [ ] Business license (scope of operations covers bid requirements)
- [ ] Relevant certifications (CMMI, ITSS, system integration qualifications, etc.)
- [ ] Dengbao assessment qualifications (if the bidder must hold them)
- [ ] Xinchuang adaptation certification / compatibility reports
- [ ] Financial audit reports for the past 3 years
- [ ] Declaration of no major legal violations
- [ ] Social insurance / tax payment certificates
- [ ] Power of attorney (if not signed by the legal representative)
- [ ] Consortium agreement (if bidding as a consortium)
## Technical Proposal
- [ ] Does it respond point-by-point to the bid document's technical requirements?
- [ ] Are architecture diagrams complete and clear (overall / network topology / deployment)?
- [ ] Does the Xinchuang plan specify product models and compatibility details?
- [ ] Are Dengbao/Miping designs covered in a dedicated chapter?
- [ ] Does the implementation plan include a Gantt chart and milestones?
- [ ] Does the project team section include personnel resumes and certifications?
- [ ] Are case studies supported by contracts / acceptance reports?
## Commercial
- [ ] Is the quoted price within the budget control limit?
- [ ] Does the pricing breakdown match the bill of materials in the technical proposal?
- [ ] Do payment terms respond to the bid document's requirements?
- [ ] Does the warranty period meet requirements?
- [ ] Is there risk of unreasonably low pricing?
## Formatting
- [ ] Continuous page numbering, table of contents matches content
- [ ] All signatures and stamps are complete (including spine stamps)
- [ ] Correct number of originals / copies
- [ ] Sealing meets requirements
- [ ] Bid bond has been paid
- [ ] Electronic version matches the print version
Dengbao & Xinchuang Compliance Matrix
# Compliance Check Matrix
## Dengbao 2.0 Level 3 Key Controls
| Security Domain | Control Requirement | Proposed Measure | Product/Component | Status |
|-----------------|-------------------|------------------|-------------------|--------|
| Secure Communications | Network architecture security | Security zone segmentation, VLAN isolation | Firewall / switches | |
| Secure Communications | Transmission security | SM4 encrypted transmission | Guomi VPN gateway | |
| Secure Boundary | Boundary protection | Access control policies | Next-gen firewall | |
| Secure Boundary | Intrusion prevention | IDS/IPS deployment | Intrusion detection system | |
| Secure Computing | Identity authentication | Two-factor authentication | Guomi CA + dynamic token | |
| Secure Computing | Data integrity | SM3 checksum verification | Guomi middleware | |
| Secure Computing | Data backup & recovery | Local + offsite backup | Backup appliance | |
| Security Mgmt Center | Centralized management | Unified security management platform | SIEM/SOC platform | |
| Security Mgmt Center | Audit management | Centralized log collection & analysis | Log audit system | |
## Xinchuang Adaptation Checklist
| Layer | Component | Current Product | Xinchuang Alternative | Compatibility Test | Priority |
|-------|-----------|----------------|----------------------|-------------------|----------|
| Chip | CPU | Intel Xeon | Kunpeng 920 / Phytium S2500 | | P0 |
| OS | Server OS | CentOS 7 | UnionTech UOS V20 / Kylin V10 | | P0 |
| Database | RDBMS | MySQL / Oracle | DM8 (Dameng) / KingbaseES | | P0 |
| Middleware | App Server | Tomcat | TongWeb (TongTech) / BES (BaoLanDe) | | P1 |
| Middleware | Message Queue | RabbitMQ | Domestic alternative | | P2 |
| Office | Office Suite | MS Office | WPS / Yozo Office | | P1 |
Opportunity Assessment Template
# Opportunity Assessment
## Basic Information
- Project Name:
- Client Organization:
- Budget Amount:
- Funding Source: (Fiscal appropriation / Special fund / Local government bond / PPP)
- Estimated Bid Timeline:
- Project Category: (New build / Upgrade / O&M)
## Competitive Analysis
| Dimension | Our Team | Competitor A | Competitor B |
|-----------|----------|-------------|-------------|
| Technical solution fit | | | |
| Similar project cases | | | |
| Local service capability | | | |
| Client relationship foundation | | | |
| Price competitiveness | | | |
| Xinchuang compatibility | | | |
| Qualification completeness | | | |
## Opportunity Scoring
- Project authenticity score (1-5): (Is there a real budget? Is there a clear timeline?)
- Our competitiveness score (1-5):
- Client relationship score (1-5):
- Investment vs. return assessment: (Estimated presales investment vs. expected project profit)
- Overall recommendation: (Go all in / Selective participation / Recommend pass)
## Risk Flags
- [ ] Are there obvious directional clauses favoring a competitor?
- [ ] Has the client's funding been secured?
- [ ] Is the project timeline realistic?
- [ ] Are there mandatory Xinchuang requirements where we haven't completed adaptation?
Workflow
Step 1: Opportunity Discovery & Assessment
- Monitor government procurement websites, provincial public resource trading centers, and the China Bidding and Public Service Platform (Zhongguo Zhaobiao Tou Biao Gonggong Fuwu Pingtai)
- Proactively identify potential projects through policy documents and development plans
- Conduct Go/No-Go assessment for each opportunity: market size, competitive landscape, our advantages, investment vs. return
- Produce an opportunity assessment report for leadership decision-making
Step 2: Requirements Research & Relationship Building
- Visit key client stakeholders to understand real needs (beyond what's written in the bid document)
- Help the client clarify their construction approach through requirements guidance — ideally becoming the client's "technical advisor" before the bid is even published
- Understand the client's decision-making process, budget cycle, technology preferences, and historical vendor relationships
- Build multi-level client relationships: at least one contact each at the decision-maker, business, and technical levels
Step 3: Solution Design & Refinement
- Design the technical solution based on research findings, highlighting differentiated value
- Internal review: technical feasibility review + commercial reasonableness review + compliance check
- Iterate the solution based on client feedback — a good proposal goes through at least three rounds of refinement
- Prepare a POC environment to eliminate client doubts on key technical points through live demonstrations
Step 4: Bid Execution & Presentation
- Analyze the bid document clause by clause and develop a response strategy
- Technical proposal writing, commercial pricing development, and qualification document assembly proceed in parallel
- Comprehensive bid document review — at least two people cross-check; zero tolerance for disqualification risks
- Presentation team rehearsal — control time, hit key points, prepare for questions; rehearse at least twice
Step 5: Post-Award Handoff
- After winning, promptly organize a project kickoff meeting to ensure presales commitments and delivery team understanding are aligned
- Complete presales-to-delivery knowledge transfer: requirements documents, solution details, client relationships, risk notes
- Follow up on contract signing and initial payment collection
- Establish a project retrospective mechanism — conduct a review whether you win or lose