BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.15//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240308T170000
DTEND;TZID=America/Chicago:20240308T180000
DTSTAMP:20260403T142054
CREATED:20240204T024458Z
LAST-MODIFIED:20240222T011625Z
UID:1514-1709917200-1709920800@www.common.org
SUMMARY:N2i: Getting Started with OS installs and PTFS - Speaker TBD
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs-speaker-tbd/
CATEGORIES:N2i,Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240318T170000
DTEND;TZID=America/Chicago:20240318T180000
DTSTAMP:20260403T142055
CREATED:20240315T214513Z
LAST-MODIFIED:20240315T214513Z
UID:6225-1710781200-1710784800@www.common.org
SUMMARY:N2i Networking Happy Hour
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-networking-happy-hour/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240321T110000
DTEND;TZID=America/Chicago:20240321T120000
DTSTAMP:20260403T142055
CREATED:20240306T161739Z
LAST-MODIFIED:20240519T175122Z
UID:5988-1711018800-1711022400@www.common.org
SUMMARY:POWERCast: Db2 Web Query Alternative - See m-Power in Action
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-db2-web-query-alternative-see-m-power-in-action/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240327T110000
DTEND;TZID=America/Chicago:20240327T120000
DTSTAMP:20260403T142055
CREATED:20240306T183410Z
LAST-MODIFIED:20240603T151835Z
UID:6001-1711537200-1711540800@www.common.org
SUMMARY:POWERCast: Leverage IBM i Monitoring for Process Improvement
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-leverage-ibm-i-monitoring-for-process-improvement/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240415T170000
DTEND;TZID=America/Chicago:20240415T170000
DTSTAMP:20260403T142055
CREATED:20240319T205606Z
LAST-MODIFIED:20240408T162930Z
UID:6264-1713200400-1713200400@www.common.org
SUMMARY:N2i: Getting Started with System Administration
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-system-administration/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240506T170000
DTEND;TZID=America/Chicago:20240506T180000
DTSTAMP:20260403T142055
CREATED:20240319T205935Z
LAST-MODIFIED:20240319T211602Z
UID:6266-1715014800-1715018400@www.common.org
SUMMARY:N2i: Getting Started with Performance - Dawn May
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-performance-dawn-may/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240508T100000
DTEND;TZID=America/Chicago:20240508T110000
DTSTAMP:20260403T142055
CREATED:20240417T164439Z
LAST-MODIFIED:20240417T170627Z
UID:6435-1715162400-1715166000@www.common.org
SUMMARY:POWERcast: How to Choose the Best API Management Deployment Options
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-how-to-choose-the-best-api-management-deployment-options/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240520
DTEND;VALUE=DATE:20240524
DTSTAMP:20260403T142055
CREATED:20240205T015050Z
LAST-MODIFIED:20240212T125313Z
UID:1461-1716163200-1716508799@www.common.org
SUMMARY:POWERUp 2024
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powerup-2024/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240610T170000
DTEND;TZID=America/Chicago:20240610T180000
DTSTAMP:20260403T142055
CREATED:20240319T211141Z
LAST-MODIFIED:20240319T211556Z
UID:6269-1718038800-1718042400@www.common.org
SUMMARY:N2i: Getting Started with OS Installs and PTFs
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240620T110000
DTEND;TZID=America/Chicago:20240620T120000
DTSTAMP:20260403T142055
CREATED:20240603T151446Z
LAST-MODIFIED:20240626T211428Z
UID:6721-1718881200-1718884800@www.common.org
SUMMARY:POWERcast: Be a Catalyst: Unlocking the Power of IBM in the Cloud
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-be-a-catalyst-unlocking-the-power-of-ibm-in-the-cloud/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240715T170000
DTEND;TZID=America/Chicago:20240715T180000
DTSTAMP:20260403T142055
CREATED:20240319T211247Z
LAST-MODIFIED:20240708T143258Z
UID:6272-1721062800-1721066400@www.common.org
SUMMARY:N2i Happy Hour and Networking!
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-happy-hour-and-networking/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240724T110000
DTEND;TZID=America/Chicago:20240724T120000
DTSTAMP:20260403T142055
CREATED:20240626T213459Z
LAST-MODIFIED:20240708T143236Z
UID:7250-1721818800-1721822400@www.common.org
SUMMARY:POWERcast: How Protected is Your IBM i in the Event of Disaster?
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/7250/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240814T090000
DTEND;TZID=America/Chicago:20240814T100000
DTSTAMP:20260403T142055
CREATED:20240715T184031Z
LAST-MODIFIED:20240718T161500Z
UID:7612-1723626000-1723629600@www.common.org
SUMMARY:IBM Webinar: IBM i Large User Group (LUG) review process for IBM i ISV software
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/ibm-webinar-ibm-i-large-user-group-lug-review-process-for-ibm-i-isv-software/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240905T090000
DTEND;TZID=America/Chicago:20240905T160000
DTSTAMP:20260403T142055
CREATED:20240813T165227Z
LAST-MODIFIED:20240813T165227Z
UID:8225-1725526800-1725552000@www.common.org
SUMMARY:COMMON Latin America IBM i Virtual Conference
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-latin-america-ibm-i-virtual-conference/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240916
DTEND;VALUE=DATE:20240919
DTSTAMP:20260403T142055
CREATED:20240205T084315Z
LAST-MODIFIED:20240708T143137Z
UID:2752-1726444800-1726703999@www.common.org
SUMMARY:NAViGATE 2024 - Florida
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/navigate-2024-florida/
LOCATION:Hyatt Regency Coconut Point\, 5001 Coconut Rd\, Bonita Springs\, FL\, 34134\, United States
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241007T170000
DTEND;TZID=America/Chicago:20241007T180000
DTSTAMP:20260403T142055
CREATED:20240730T173806Z
LAST-MODIFIED:20240805T221144Z
UID:7951-1728320400-1728324000@www.common.org
SUMMARY:N2i: Getting Started with Modern RPG Arrays and BiFs
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-on-rpg-bifs/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241016T100000
DTEND;TZID=America/Chicago:20241016T150000
DTSTAMP:20260403T142055
CREATED:20241004T152735Z
LAST-MODIFIED:20241004T152735Z
UID:8546-1729072800-1729090800@www.common.org
SUMMARY:IBM i Data from the Ground Up: Cybersecurity\, Operations\, Data Access and Management
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/ibm-i-data-from-the-ground-up-cybersecurity-operations-data-access-and-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241021
DTEND;VALUE=DATE:20241025
DTSTAMP:20260403T142055
CREATED:20240903T201351Z
LAST-MODIFIED:20240903T201351Z
UID:8341-1729468800-1729814399@www.common.org
SUMMARY:COMMON at TechXchange
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-at-techxchange/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241030T110000
DTEND;TZID=America/Chicago:20241030T120000
DTSTAMP:20260403T142055
CREATED:20241008T152308Z
LAST-MODIFIED:20241008T172052Z
UID:8635-1730286000-1730289600@www.common.org
SUMMARY:POWERcast: 4 Best Practices for Future-Proofing IBM i MFA
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-4-best-practices-for-future-proofing-ibm-i-mfa/
LOCATION:Zoom
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241105
DTSTAMP:20260403T142055
CREATED:20241102T163509Z
LAST-MODIFIED:20241102T163509Z
UID:8730-1730678400-1730764799@www.common.org
SUMMARY:N2i Networking and Happy Hour
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-networking-and-happy-hour/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241107
DTSTAMP:20260403T142055
CREATED:20240206T084702Z
LAST-MODIFIED:20240221T044313Z
UID:2755-1730678400-1730937599@www.common.org
SUMMARY:NAViGATE 2024 - Toronto
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/navigate-2024-toronto/
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250106T170000
DTEND;TZID=America/Chicago:20250106T180000
DTSTAMP:20260403T142055
CREATED:20250102T153815Z
LAST-MODIFIED:20250102T153815Z
UID:9181-1736182800-1736186400@www.common.org
SUMMARY:N2i Happy Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-happy-hour-and-networking-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250203T170000
DTEND;TZID=America/Chicago:20250203T180000
DTSTAMP:20260403T142055
CREATED:20250127T220326Z
LAST-MODIFIED:20250127T220326Z
UID:9291-1738602000-1738605600@www.common.org
SUMMARY:N2i: Getting Started with DB2 for i
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-getting-started-with-db2-for-i/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250224T080000
DTEND;TZID=America/Chicago:20250226T170000
DTSTAMP:20260403T142055
CREATED:20250102T153337Z
LAST-MODIFIED:20250102T153337Z
UID:9177-1740384000-1740589200@www.common.org
SUMMARY:COMMON India
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-india/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250225
DTEND;VALUE=DATE:20250228
DTSTAMP:20260403T142055
CREATED:20250102T153023Z
LAST-MODIFIED:20250127T163318Z
UID:9175-1740441600-1740700799@www.common.org
SUMMARY:Focus 2025
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/focus-2025/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260403T142055
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260403T142055
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250407T170000
DTEND;TZID=America/Chicago:20250407T180000
DTSTAMP:20260403T142055
CREATED:20250317T195445Z
LAST-MODIFIED:20250318T172209Z
UID:9611-1744045200-1744048800@www.common.org
SUMMARY:N2i Presents: Biggest Threats Facing IBM i Security Today
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-presents-biggest-threats-facing-ibm-i-security-today/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250505T123000
DTEND;TZID=America/Chicago:20250505T133000
DTSTAMP:20260403T142055
CREATED:20250318T171610Z
LAST-MODIFIED:20250421T203434Z
UID:9631-1746448200-1746451800@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-2/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250519
DTEND;VALUE=DATE:20250523
DTSTAMP:20260403T142055
CREATED:20240722T143520Z
LAST-MODIFIED:20240722T143520Z
UID:7864-1747612800-1747958399@www.common.org
SUMMARY:POWERUp 2025
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powerup-2025/
CATEGORIES:In Person
END:VEVENT
END:VCALENDAR