BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260417T191151
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/neugc/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260406T123000
DTEND;TZID=America/Chicago:20260406T133000
DTSTAMP:20260417T191152
CREATED:20260224T172154Z
LAST-MODIFIED:20260325T171949Z
UID:12024-1775478600-1775482200@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-7/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T110000
DTEND;TZID=America/Chicago:20260319T120000
DTSTAMP:20260417T191152
CREATED:20260226T160155Z
LAST-MODIFIED:20260306T133755Z
UID:12061-1773918000-1773921600@www.common.org
SUMMARY:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-working-together-on-ibm-i-git-change-management-for-innovative-ibm-i-devops/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260310T080000
DTEND;TZID=America/Chicago:20260310T170000
DTSTAMP:20260417T191152
CREATED:20260209T163235Z
LAST-MODIFIED:20260209T163235Z
UID:11964-1773129600-1773162000@www.common.org
SUMMARY:COMMON at WMPCA
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-at-wmpca/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260309T120000
DTEND;TZID=America/Chicago:20260309T130000
DTSTAMP:20260417T191152
CREATED:20260302T160413Z
LAST-MODIFIED:20260309T153333Z
UID:12102-1773057600-1773061200@www.common.org
SUMMARY:N2i: AI with IBM i Overview
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-ai-with-ibm-i-overview/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260217
DTEND;VALUE=DATE:20260219
DTSTAMP:20260417T191152
CREATED:20260107T142252Z
LAST-MODIFIED:20260107T143259Z
UID:11663-1771286400-1771459199@www.common.org
SUMMARY:Focus 2026
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/focus-2026/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260202T123000
DTEND;TZID=America/Chicago:20260202T133000
DTSTAMP:20260417T191152
CREATED:20260112T203231Z
LAST-MODIFIED:20260112T205423Z
UID:11737-1770035400-1770039000@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-6/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260202
DTEND;VALUE=DATE:20260204
DTSTAMP:20260417T191152
CREATED:20260112T210121Z
LAST-MODIFIED:20260112T210121Z
UID:11755-1769990400-1770163199@www.common.org
SUMMARY:COMMON India
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-india-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260112T140000
DTEND;TZID=America/Chicago:20260112T150000
DTSTAMP:20260417T191152
CREATED:20250814T193140Z
LAST-MODIFIED:20260107T184943Z
UID:10541-1768226400-1768230000@www.common.org
SUMMARY:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-fortify-and-conquer-secure-coding-strategies-for-ibm-i-developers/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251216T110000
DTEND;TZID=America/Chicago:20251216T120000
DTSTAMP:20260417T191152
CREATED:20251208T105151Z
LAST-MODIFIED:20251209T142147Z
UID:11476-1765882800-1765886400@www.common.org
SUMMARY:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-how-to-avoid-the-biggest-mistakes-in-ibm-i-security/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251201T123000
DTEND;TZID=America/Chicago:20251201T133000
DTSTAMP:20260417T191152
CREATED:20251104T194331Z
LAST-MODIFIED:20251112T180417Z
UID:11221-1764592200-1764595800@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-5/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251119T110000
DTEND;TZID=America/Chicago:20251119T120000
DTSTAMP:20260417T191152
CREATED:20251106T220106Z
LAST-MODIFIED:20251119T181320Z
UID:11249-1763550000-1763553600@www.common.org
SUMMARY:POWERcast - IFS Security: Don’t Leave Your Server Vulnerable
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-ifs-security-dont-leave-your-server-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251103T170000
DTEND;TZID=America/Chicago:20251103T180000
DTSTAMP:20260417T191152
CREATED:20250728T152959Z
LAST-MODIFIED:20251006T110830Z
UID:10477-1762189200-1762192800@www.common.org
SUMMARY:N2i Getting Started With: How to Get Oriented on this Weird Platform
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-how-to-get-oriented-on-this-weird-platform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251029T110000
DTEND;TZID=America/Chicago:20251029T120000
DTSTAMP:20260417T191152
CREATED:20251013T183538Z
LAST-MODIFIED:20251017T221433Z
UID:11010-1761735600-1761739200@www.common.org
SUMMARY:POWERcast : Security & Quality Without Compromise—See What’s Next for IBM i
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-security-quality-without-compromise-see-whats-next-for-ibm-i/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T110000
DTEND;TZID=America/Chicago:20251016T120000
DTSTAMP:20260417T191152
CREATED:20250924T195934Z
LAST-MODIFIED:20251015T115919Z
UID:10839-1760612400-1760616000@www.common.org
SUMMARY:POWERcast: Using IBM i Self-Service Password Reset to Reduce Costs\, Improve Security
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-using-ibm-i-self-service-password-reset-to-reduce-costs-improve-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251013T123000
DTEND;TZID=America/Chicago:20251013T133000
DTSTAMP:20260417T191152
CREATED:20250911T191448Z
LAST-MODIFIED:20250911T191906Z
UID:10738-1760358600-1760362200@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251006
DTEND;VALUE=DATE:20251010
DTSTAMP:20260417T191152
CREATED:20250617T174210Z
LAST-MODIFIED:20250617T174210Z
UID:10130-1759708800-1760054399@www.common.org
SUMMARY:IBM TechXChange 2025
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/ibm-techxchange-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250924T110000
DTEND;TZID=America/Chicago:20250924T120000
DTSTAMP:20260417T191152
CREATED:20250905T130340Z
LAST-MODIFIED:20250918T150510Z
UID:10682-1758711600-1758715200@www.common.org
SUMMARY:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-turgon-ai/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250915T080000
DTEND;TZID=America/Chicago:20250917T123000
DTSTAMP:20260417T191152
CREATED:20250106T162744Z
LAST-MODIFIED:20250827T140842Z
UID:9202-1757923200-1758112200@www.common.org
SUMMARY:NAViGATE 2025
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/navigate-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250910T110000
DTEND;TZID=America/Chicago:20250910T120000
DTSTAMP:20260417T191152
CREATED:20250822T184105Z
LAST-MODIFIED:20250822T184715Z
UID:10628-1757502000-1757505600@www.common.org
SUMMARY:POWERcast: Sizing Power11 Correctly with Performance Navigator
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-sizing-power11-correctly-with-performance-navigator/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250908T170000
DTEND;TZID=America/Chicago:20250908T180000
DTSTAMP:20260417T191152
CREATED:20250701T190014Z
LAST-MODIFIED:20250717T201437Z
UID:10256-1757350800-1757354400@www.common.org
SUMMARY:N2i: Forget ODBC! Here's a New Db2 Connector
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-db2connector/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250707T123000
DTEND;TZID=America/Chicago:20250707T133000
DTSTAMP:20260417T191152
CREATED:20250318T171733Z
LAST-MODIFIED:20250609T144634Z
UID:9636-1751891400-1751895000@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-3/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250625T120000
DTEND;TZID=America/Chicago:20250625T130000
DTSTAMP:20260417T191152
CREATED:20250604T143333Z
LAST-MODIFIED:20250617T151958Z
UID:10007-1750852800-1750856400@www.common.org
SUMMARY:Cyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/cyber-resilient-backup-patterns-for-ibm-power-vs-and-hybrid-workloads/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250602T170000
DTEND;TZID=America/Chicago:20250602T180000
DTSTAMP:20260417T191152
CREATED:20250318T171859Z
LAST-MODIFIED:20250513T142953Z
UID:9638-1748883600-1748887200@www.common.org
SUMMARY:N2i Getting Started With: Leveraging SQL Services
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250529T110000
DTEND;TZID=America/Chicago:20250529T120000
DTSTAMP:20260417T191152
CREATED:20250422T231515Z
LAST-MODIFIED:20250513T150428Z
UID:9793-1748516400-1748520000@www.common.org
SUMMARY:POWERcast: IBM i Ransomware/Malware Detection and Prevention
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/ibm-i-ransomware-malware-detection-and-prevention/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250519
DTEND;VALUE=DATE:20250523
DTSTAMP:20260417T191152
CREATED:20240722T143520Z
LAST-MODIFIED:20240722T143520Z
UID:7864-1747612800-1747958399@www.common.org
SUMMARY:POWERUp 2025
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powerup-2025/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250505T123000
DTEND;TZID=America/Chicago:20250505T133000
DTSTAMP:20260417T191152
CREATED:20250318T171610Z
LAST-MODIFIED:20250421T203434Z
UID:9631-1746448200-1746451800@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-2/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250407T170000
DTEND;TZID=America/Chicago:20250407T180000
DTSTAMP:20260417T191152
CREATED:20250317T195445Z
LAST-MODIFIED:20250318T172209Z
UID:9611-1744045200-1744048800@www.common.org
SUMMARY:N2i Presents: Biggest Threats Facing IBM i Security Today
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-presents-biggest-threats-facing-ibm-i-security-today/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260417T191152
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260417T191152
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
END:VCALENDAR