BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250707T123000
DTEND;TZID=America/Chicago:20250707T133000
DTSTAMP:20260430T120834
CREATED:20250318T171733Z
LAST-MODIFIED:20250609T144634Z
UID:9636-1751891400-1751895000@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:Come network with your peers during your lunch hour! \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-3/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250625T120000
DTEND;TZID=America/Chicago:20250625T130000
DTSTAMP:20260430T120834
CREATED:20250604T143333Z
LAST-MODIFIED:20250617T151958Z
UID:10007-1750852800-1750856400@www.common.org
SUMMARY:Cyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads
DESCRIPTION:Presenters: \nTony Fiorot\, IBM – Cloud Solution Sales Executive\, Power Systems Virtual Server\nRichard R. Spurlock\, Cobalt Iron – CEO and Founder\nMatt Dittoe\, Cobalt Iron – Vice President of Sales \nPrice: Free Courtesy of Cobalt Iron \nDate/Time: June 25th\, 2025 @ 12:00 PM CT \nCyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads \nAre backup challenges and security complexities leaving you frustrated or overwhelmed? If so\, you won’t want to miss this discussion! \nOur panel of experts will explore three customer use cases including specific challenges\, overview of solution patterns\, and the impacts of Compass Secure Automated Backup. \nCustomer Challenges Explored: \n\nChallenge #1 – Reduce risk moving on-premises Power workloads to the cloud\n\nChallenge #2 – Hybrid data protection\n\nChallenge #3 – Unify protection for Power and x86 workloads (VMware\, KVM\, etc.)\n\n  \n Register Today  \n \nTony Fiorot \nTony is a dynamic leader with a passion for guiding teams and customers through transformational change and the adoption of emerging technologies. With deep expertise in solution sales\, business transformation\, and Go-To-Market strategies\, Tony has helped organizations unlock the full potential of cloud services\, artificial intelligence\, and digital user experiences. He is highly skilled in security and privacy by design\, data protection\, enterprise content management\, workflow optimization\, strategic planning\, consulting\, and financial analysis. \nKnown for his ability to make complex technical topics accessible and engaging\, Tony combines technical mastery with an energetic\, approachable style that resonates with diverse audiences. Tony’s outstanding contributions have been recognized with the prestigious Best of IBM Award in 2018. \n  \n \nRichard R. Spurlock \nIntellectually curious entrepreneur\, Richard is recognized as a global expert on data protection and recovery. After spending 15 years designing and delivering the world’s largest data protection applications\, Richard harnessed that expertise to build a disruptive\, software-defined data protection solution: Compass. Compass is the industry’s first enterprise-class data protection and analytics software designed to natively run in hybrid and public cloud environments. An experienced speaker and subject matter expert\, Richard is a frequent industry spokesman and an avid Formula 1 racing fan with his family. \n  \n \nMatt Dittoe  \nA former developer\, architect\, and systems engineer\, Matt has deep infrastructure knowledge and experience that he brings to solution sales and customer engagement.  He has held a series of leadership positions at Amazon Web Services\, Oracle\, SolarWinds\, Hewlett Packard\, and at Cobalt Iron\, where he currently serves as Vice President of Sales.
URL:https://www.common.org/event/cyber-resilient-backup-patterns-for-ibm-power-vs-and-hybrid-workloads/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250602T170000
DTEND;TZID=America/Chicago:20250602T180000
DTSTAMP:20260430T120834
CREATED:20250318T171859Z
LAST-MODIFIED:20250513T142953Z
UID:9638-1748883600-1748887200@www.common.org
SUMMARY:N2i Getting Started With: Leveraging SQL Services
DESCRIPTION:With every Tech Refresh and OS upgrade\, IBM provides new and updated SQL Services.  These are tools for the developer\, administrator\, and engineer which combine the power of existing APIs with the ease-of-use of SQL.  Whether you’re an expert SQL developer\, or you traditionally use the “greenscreen” for your dev/admin activities\, these IBM i Services can greatly improve your efficiency.  Learn how to use these tools individually and in combination to unlock their full potential!  Bring your questions and any challenges that you’re facing. \nSpeaker: Steve Riedmueller \nBio: Steve has been working on the IBM i platform since 2001. He has developed an expertise in system security\, performance\, communications\, and various IBM and 3rd-party software packages. Steve holds a B.S. from Rutgers University. In recent years Steve has become a COMMON and WMCPA speaker\, an N2i mentor\, and the N2i committee lead. In the world of IBM i technology\, Steve is passionate about process improvement. He enjoys leveraging IBM i SQL Services for administration/operations tasks such as security and performance\, as well as automation. \n  \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250529T110000
DTEND;TZID=America/Chicago:20250529T120000
DTSTAMP:20260430T120834
CREATED:20250422T231515Z
LAST-MODIFIED:20250513T150428Z
UID:9793-1748516400-1748520000@www.common.org
SUMMARY:POWERcast: IBM i Ransomware/Malware Detection and Prevention
DESCRIPTION:Presenters: Ken McCalister and Rick Hengst Price: Free Courtesy of SEADate/Time: May 29th\, 2025 @ 11:00 AM CT \nHow Secure Is Your IBM i Against Ransomware & Malware? \nFailure to quickly detect and respond to IBM i cyberattacks can result in data loss\, reputational damage\, lost revenue\, and other serious consequences. \nJoin SEA on May 29th to learn how to protect your IBM i systems from these growing threats.We’ll share practical strategies and tactics to strengthen your defenses and enhance your response to ransomware and malware attacks including: \n• Identifying vulnerabilities in IBM i systems• Stopping cyberattacks before they reach IBM i servers• Developing effective ransomware and malware prevention strategies• Enabling IBM i protection to detect\, alert\, block\, and report cyberattacks• Recovering from ransomware and malware incidents \nDon’t miss this opportunity to discover how to improve your cybersecurity and protect your IBM i systems from ransomware and malware. \n  \n \nKen McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management\, including Administration\, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft\, providing support to its many diverse clients \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products. \n					\n									Register Today
URL:https://www.common.org/event/ibm-i-ransomware-malware-detection-and-prevention/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250519
DTEND;VALUE=DATE:20250523
DTSTAMP:20260430T120834
CREATED:20240722T143520Z
LAST-MODIFIED:20240722T143520Z
UID:7864-1747612800-1747958399@www.common.org
SUMMARY:POWERUp 2025
DESCRIPTION:Join us in Anaheim California for POWERUp 2025! More information coming soon
URL:https://www.common.org/event/powerup-2025/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250505T123000
DTEND;TZID=America/Chicago:20250505T133000
DTSTAMP:20260430T120834
CREATED:20250318T171610Z
LAST-MODIFIED:20250421T203434Z
UID:9631-1746448200-1746451800@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:Network with your peers and problem solve on your lunch break!  \nSee you there \n  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-2/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250407T170000
DTEND;TZID=America/Chicago:20250407T180000
DTSTAMP:20260430T120834
CREATED:20250317T195445Z
LAST-MODIFIED:20250318T172209Z
UID:9611-1744045200-1744048800@www.common.org
SUMMARY:N2i Presents: Biggest Threats Facing IBM i Security Today
DESCRIPTION:N2i Presents: Biggest Threats Facing IBM i Security Today\nWhat do you mean threats? Everyone’s told me the system is secure?!? Spoiler alert … it’s secure-able. Meaning\, when security is not addressed\, the system can be vulnerable. In this session Carol Woodbury will describe the security threats facing IBM i today. She will describe the threats as well as provide ways to address them. She will also explain how security should be important to everyone – including developers – and what happens when it’s ignored or forgotten.s. \n																														 \nSee what’s next on the n2i calendar here \n					\n									< Back to Events\n					 \nCarol Woodbury is Senior Advisor and IBM i Security SME at Kisco Systems. She started her career at IBM in Rochester\, MN and has helped clients secure IBM i for over 25 years. She has two books\, IBM i Security Administration and Compliance\, 3nd edition and Mastering IBM i Security and has her CISSP and CRISC security certifications. \n					\n									Register
URL:https://www.common.org/event/n2i-presents-biggest-threats-facing-ibm-i-security-today/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260430T120834
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260430T120834
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:Join us for your lunch break and network with your peers!
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250225
DTEND;VALUE=DATE:20250228
DTSTAMP:20260430T120834
CREATED:20250102T153023Z
LAST-MODIFIED:20250127T163318Z
UID:9175-1740441600-1740700799@www.common.org
SUMMARY:Focus 2025
DESCRIPTION:
URL:https://www.common.org/event/focus-2025/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250224T080000
DTEND;TZID=America/Chicago:20250226T170000
DTSTAMP:20260430T120834
CREATED:20250102T153337Z
LAST-MODIFIED:20250102T153337Z
UID:9177-1740384000-1740589200@www.common.org
SUMMARY:COMMON India
DESCRIPTION:
URL:https://www.common.org/event/common-india/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250203T170000
DTEND;TZID=America/Chicago:20250203T180000
DTSTAMP:20260430T120834
CREATED:20250127T220326Z
LAST-MODIFIED:20250127T220326Z
UID:9291-1738602000-1738605600@www.common.org
SUMMARY:N2i: Getting Started with DB2 for i
DESCRIPTION:
URL:https://www.common.org/event/n2i-getting-started-with-db2-for-i/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250106T170000
DTEND;TZID=America/Chicago:20250106T180000
DTSTAMP:20260430T120834
CREATED:20250102T153815Z
LAST-MODIFIED:20250102T153815Z
UID:9181-1736182800-1736186400@www.common.org
SUMMARY:N2i Happy Hour and Networking
DESCRIPTION:
URL:https://www.common.org/event/n2i-happy-hour-and-networking-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241107
DTSTAMP:20260430T120834
CREATED:20240206T084702Z
LAST-MODIFIED:20240221T044313Z
UID:2755-1730678400-1730937599@www.common.org
SUMMARY:NAViGATE 2024 - Toronto
DESCRIPTION:November 4 – 6\, 2024\nWestin Harbour Castle\nToronto\, Ontario – CANADA
URL:https://www.common.org/event/navigate-2024-toronto/
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241105
DTSTAMP:20260430T120834
CREATED:20241102T163509Z
LAST-MODIFIED:20241102T163509Z
UID:8730-1730678400-1730764799@www.common.org
SUMMARY:N2i Networking and Happy Hour
DESCRIPTION:Join N2i for Happy Hour and Networking 
URL:https://www.common.org/event/n2i-networking-and-happy-hour/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241030T110000
DTEND;TZID=America/Chicago:20241030T120000
DTSTAMP:20260430T120834
CREATED:20241008T152308Z
LAST-MODIFIED:20241008T172052Z
UID:8635-1730286000-1730289600@www.common.org
SUMMARY:POWERcast: 4 Best Practices for Future-Proofing IBM i MFA
DESCRIPTION:Presenter: Lloyd Ramdarie and Ken McCalister\nPrice: Free Courtesy of Software Engineering of America\nDate/Time: October 30\, 2024 @ 11:00AM (CT) \n  \nREGISTER HERE \n  \n4 Best Practices for Future-Proofing IBM i MFA \n  \nMulti-factor authentication (MFA) systems\, while a valuable security measure\, are not without vulnerabilities. Phishing attacks\, SIM swapping\, man-in-the-middle attacks\, MFA fatigue\, and more can still compromise logins. \nJoin SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: \n\nPatching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.\nImmunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.\nIntegrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.\nStrengthening authentication security: Leveraging hard-to-break MFA verification factors.\n\nAll attendees will receive a copy of SEA’s Guide to IBM i Multi-Factor Authentication (MFA)\, an IBM i-specific roadmap and checklist for deploying MFA. \n  \n \nLloyd Ramdarie \nLloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i. \nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment. \n \nKen McCalister \nKen McCalister has spent 35 years working with IBM i technology. Ken has a vast experience working in all aspects of digital technology and management including administration\, engineering\, and security. \nKen is part of the IBM i Technical Team at Software Engineering of America\, providing ongoing support to its many diverse clients.
URL:https://www.common.org/event/powercast-4-best-practices-for-future-proofing-ibm-i-mfa/
LOCATION:Zoom
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241021
DTEND;VALUE=DATE:20241025
DTSTAMP:20260430T120834
CREATED:20240903T201351Z
LAST-MODIFIED:20240903T201351Z
UID:8341-1729468800-1729814399@www.common.org
SUMMARY:COMMON at TechXchange
DESCRIPTION:Visit COMMON at the IBM TechXChange Event in Mandalay Bay\, October 21 – 24
URL:https://www.common.org/event/common-at-techxchange/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241016T100000
DTEND;TZID=America/Chicago:20241016T150000
DTSTAMP:20260430T120834
CREATED:20241004T152735Z
LAST-MODIFIED:20241004T152735Z
UID:8546-1729072800-1729090800@www.common.org
SUMMARY:IBM i Data from the Ground Up: Cybersecurity\, Operations\, Data Access and Management
DESCRIPTION:
URL:https://www.common.org/event/ibm-i-data-from-the-ground-up-cybersecurity-operations-data-access-and-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241007T170000
DTEND;TZID=America/Chicago:20241007T180000
DTSTAMP:20260430T120834
CREATED:20240730T173806Z
LAST-MODIFIED:20240805T221144Z
UID:7951-1728320400-1728324000@www.common.org
SUMMARY:N2i: Getting Started with Modern RPG Arrays and BiFs
DESCRIPTION:Date: October 7\, at 5:00 p.m. CT\nSpeaker: Simon Hutchinson \nRPG is an evolving programming language. Over the past few years there have been a number of significant changes to the ways arrays work. And a number of BiFs (Built in Functions) have been added and enhanced to help make doing things with arrays easier. Come join Simon as he goes through what these changes are\, how he uses them\, and how much easier makes the use of arrays within your RPG programs. \nREGISTER HERE
URL:https://www.common.org/event/n2i-getting-started-on-rpg-bifs/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240916
DTEND;VALUE=DATE:20240919
DTSTAMP:20260430T120834
CREATED:20240205T084315Z
LAST-MODIFIED:20240708T143137Z
UID:2752-1726444800-1726703999@www.common.org
SUMMARY:NAViGATE 2024 - Florida
DESCRIPTION:September 16 – 18\, 2024\nHyatt Regency Coconut Point\nBonita Springs\, Florida
URL:https://www.common.org/event/navigate-2024-florida/
LOCATION:Hyatt Regency Coconut Point\, 5001 Coconut Rd\, Bonita Springs\, FL\, 34134\, United States
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240905T090000
DTEND;TZID=America/Chicago:20240905T160000
DTSTAMP:20260430T120834
CREATED:20240813T165227Z
LAST-MODIFIED:20240813T165227Z
UID:8225-1725526800-1725552000@www.common.org
SUMMARY:COMMON Latin America IBM i Virtual Conference
DESCRIPTION:https://www.common.org/common-latin-america/
URL:https://www.common.org/event/common-latin-america-ibm-i-virtual-conference/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240814T090000
DTEND;TZID=America/Chicago:20240814T100000
DTSTAMP:20260430T120834
CREATED:20240715T184031Z
LAST-MODIFIED:20240718T161500Z
UID:7612-1723626000-1723629600@www.common.org
SUMMARY:IBM Webinar: IBM i Large User Group (LUG) review process for IBM i ISV software
DESCRIPTION:IBM Webinar: IBM i Large User Group (LUG) review process for IBM i ISV software\nThe LUG (IBM i Large User Group) has developed a review process for ISV software products running on IBM i. During this webinar\, Dutch Holland and Dave Wiseman\, IBM i Large User Group co-chairs\, will share the process and scoring system and attendees will have an opportunity to provide feedback and input to the process. \n  \n																										 \nWebinar | August 14\, 2024 9:00 AM CDT | Register
URL:https://www.common.org/event/ibm-webinar-ibm-i-large-user-group-lug-review-process-for-ibm-i-isv-software/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240724T110000
DTEND;TZID=America/Chicago:20240724T120000
DTSTAMP:20260430T120834
CREATED:20240626T213459Z
LAST-MODIFIED:20240708T143236Z
UID:7250-1721818800-1721822400@www.common.org
SUMMARY:POWERcast: How Protected is Your IBM i in the Event of Disaster?
DESCRIPTION:Presenter: Mark Martin\, CSCP\, Th.M. and Paul Cinquegrane\nPrice: Free Courtesy of FalconStor\nDate/Time: July 24\, 2024 @ 11:00AM (CT) \n  \nREGISTER HERE \n  \nHow Protected is Your IBM i in the Event of Disaster? \nEasily deploy hybrid cloud protection with IBM PowerVS and FalconStor StorSafe VTL for Disaster Recovery \n  \nTape-base recovery can be slow and problematic when you need your workloads up and running quickly.  Adding cloud-based backup can provide an extra layer of protection for fast recovery in the event of a disaster. \nJoin IBM and FalconStor for this free webinar where we discuss how IBM Power Virtual Server with StorSafe VTL can optimize and enhance data protection for your IBM i environments. \n\nThe benefits of IBM Power Virtual Server for hybrid cloud data protection\nHow StorSafe VTL can work with native IBM i backup tools like BRMS to optimize backup and recovery both on-premises and in the cloud\, adding improved performance and reduced backend storage needs\nHow to help protect against Ransomware with data immutability in IBM COS.\n\n  \n \nMark U. Martin\, CSCP\, Th.M.\nProduct Manager\, Workloads\nPowerVS\nIBM Systems \n \nPaul Cinquegrane\nRegional Sales Director Americas\nFalconstore
URL:https://www.common.org/event/7250/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240715T170000
DTEND;TZID=America/Chicago:20240715T180000
DTSTAMP:20260430T120834
CREATED:20240319T211247Z
LAST-MODIFIED:20240708T143258Z
UID:6272-1721062800-1721066400@www.common.org
SUMMARY:N2i Happy Hour and Networking!
DESCRIPTION:Date: July 15\, at 5:00 p.m. CT\nSpeaker: TBD \nJoin us to get your burning IBM i-related questions answered and meet new people! \nREGISTER HERE
URL:https://www.common.org/event/n2i-happy-hour-and-networking/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240620T110000
DTEND;TZID=America/Chicago:20240620T120000
DTSTAMP:20260430T120834
CREATED:20240603T151446Z
LAST-MODIFIED:20240626T211428Z
UID:6721-1718881200-1718884800@www.common.org
SUMMARY:POWERcast: Be a Catalyst: Unlocking the Power of IBM in the Cloud
DESCRIPTION:Presenter: Richard Dolewski\, Connectria\nPrice: Free Courtesy of Connectria\nDate/Time: June 20\, 2024 @ 11:00AM (CT) \n  \nREGISTER HERE \n  \nBe a Catalyst: Unlocking the Power of IBM in the Cloud  \nHybrid cloud combines and unifies IBM Private and Multi Clouds ( AWS\, Azure\, GCP ) into a single\, scalable reference architecture built to meet today’s business needs. \nJoin us on a transformative journey as we explore the importance of secure and resilient Multi-Cloud solutions purpose built for IBM. \n\nUnlock the modern capabilities of IBM Power Systems without introducing the complexity and risk of extensive refactoring\nSeamlessly move applications/systems with minimal downtime\nDRaaS and Db2 Mirror HA Solutions\nHybrid Cloud Architecture: Enhancing resiliency\, security\, and compliance\n\nUncover compelling reasons why Hybrid Cloud computing is vital for businesses driving positive outcomes. \n \nRichard is a recognized SME and award-winning industry speaker specializing in\, Cloud Computing Architecture\, Business Resiliency\, Disaster Recovery Planning and Backup & Recovery Program Design. He leads organizations through the new era of technology\, achieving the desired\, successful business outcomes. \nHelping businesses realize their Cloud vision in the new World of IT.
URL:https://www.common.org/event/powercast-be-a-catalyst-unlocking-the-power-of-ibm-in-the-cloud/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240610T170000
DTEND;TZID=America/Chicago:20240610T180000
DTSTAMP:20260430T120834
CREATED:20240319T211141Z
LAST-MODIFIED:20240319T211556Z
UID:6269-1718038800-1718042400@www.common.org
SUMMARY:N2i: Getting Started with OS Installs and PTFs
DESCRIPTION:Date: June 10\, at 5:00 p.m. CT\nSpeaker: Nathan Williams \nJoin us to get your burning IBM i-related questions answered and meet new people! \nREGISTER HERE
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240520
DTEND;VALUE=DATE:20240524
DTSTAMP:20260430T120834
CREATED:20240205T015050Z
LAST-MODIFIED:20240212T125313Z
UID:1461-1716163200-1716508799@www.common.org
SUMMARY:POWERUp 2024
DESCRIPTION:May 20 – May 23
URL:https://www.common.org/event/powerup-2024/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240508T100000
DTEND;TZID=America/Chicago:20240508T110000
DTSTAMP:20260430T120834
CREATED:20240417T164439Z
LAST-MODIFIED:20240417T170627Z
UID:6435-1715162400-1715166000@www.common.org
SUMMARY:POWERcast: How to Choose the Best API Management Deployment Options
DESCRIPTION:Presenter: Jeroen van Dun\, Rocket Software\nPrice: Free Courtesy of Rocket Software\nDate/Time: May 8\, 2024 at 10:00 am CT\n  \nSelecting the ideal deployment of your API Management tools will significantly impact your company’s bottom line. Should you deploy on-site\, cloud\, or hybrid? How do you go about choosing the best option for your company? Do you have the resources\, data\, and tools to determine the best action? Do you have enough data to back your decisions?   \nDuring this session\, we will discuss:  \n\nBest practices for selecting the right deployment that will help you drive greater ROI \nNew tools available to you to better understand use case workflows \nHow to create a development plan that quickly delivers what businesses are looking for \n\n  \n\n										\nJeroen van Dun Senior Manager\, Product Management\, Rocket Software \n			\n						Register
URL:https://www.common.org/event/powercast-how-to-choose-the-best-api-management-deployment-options/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240506T170000
DTEND;TZID=America/Chicago:20240506T180000
DTSTAMP:20260430T120834
CREATED:20240319T205935Z
LAST-MODIFIED:20240319T211602Z
UID:6266-1715014800-1715018400@www.common.org
SUMMARY:N2i: Getting Started with Performance - Dawn May
DESCRIPTION:Date: May 6\, at 5:00 p.m. CT\nSpeaker: Dawn May \nJoin us to get your burning IBM i-related questions answered and meet new people! \n  \nREGISTER HERE
URL:https://www.common.org/event/n2i-getting-started-with-performance-dawn-may/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240415T170000
DTEND;TZID=America/Chicago:20240415T170000
DTSTAMP:20260430T120834
CREATED:20240319T205606Z
LAST-MODIFIED:20240408T162930Z
UID:6264-1713200400-1713200400@www.common.org
SUMMARY:N2i: Getting Started with System Administration
DESCRIPTION:Date: April 15\, at 5:00 p.m. CT\nSpeaker: Pete Massiello \nJoin us to get your burning IBM i-related questions answered and meet new people! \n  \nREGISTER HERE
URL:https://www.common.org/event/n2i-getting-started-with-system-administration/
CATEGORIES:N2i
END:VEVENT
END:VCALENDAR