and overall performance of regional network and voice technology systems for region mining operations Manage all licensing exposure within the networking, voice and perimeter security infrastructure. Provide specialised
interfaces, IDOC and RFC's processing Preparing the cut over strategy for SD objects Preparing User manuals and
infrastructure can support anticipated demand without over-provisioning or under-provisioning resources. Performance