BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240916
DTEND;VALUE=DATE:20240919
DTSTAMP:20260428T154722
CREATED:20240205T084315Z
LAST-MODIFIED:20240708T143137Z
UID:2752-1726444800-1726703999@www.common.org
SUMMARY:NAViGATE 2024 - Florida
DESCRIPTION:September 16 – 18\, 2024\nHyatt Regency Coconut Point\nBonita Springs\, Florida
URL:https://www.common.org/event/navigate-2024-florida/
LOCATION:Hyatt Regency Coconut Point\, 5001 Coconut Rd\, Bonita Springs\, FL\, 34134\, United States
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241007T170000
DTEND;TZID=America/Chicago:20241007T180000
DTSTAMP:20260428T154722
CREATED:20240730T173806Z
LAST-MODIFIED:20240805T221144Z
UID:7951-1728320400-1728324000@www.common.org
SUMMARY:N2i: Getting Started with Modern RPG Arrays and BiFs
DESCRIPTION:Date: October 7\, at 5:00 p.m. CT\nSpeaker: Simon Hutchinson \nRPG is an evolving programming language. Over the past few years there have been a number of significant changes to the ways arrays work. And a number of BiFs (Built in Functions) have been added and enhanced to help make doing things with arrays easier. Come join Simon as he goes through what these changes are\, how he uses them\, and how much easier makes the use of arrays within your RPG programs. \nREGISTER HERE
URL:https://www.common.org/event/n2i-getting-started-on-rpg-bifs/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241016T100000
DTEND;TZID=America/Chicago:20241016T150000
DTSTAMP:20260428T154722
CREATED:20241004T152735Z
LAST-MODIFIED:20241004T152735Z
UID:8546-1729072800-1729090800@www.common.org
SUMMARY:IBM i Data from the Ground Up: Cybersecurity\, Operations\, Data Access and Management
DESCRIPTION:
URL:https://www.common.org/event/ibm-i-data-from-the-ground-up-cybersecurity-operations-data-access-and-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241021
DTEND;VALUE=DATE:20241025
DTSTAMP:20260428T154722
CREATED:20240903T201351Z
LAST-MODIFIED:20240903T201351Z
UID:8341-1729468800-1729814399@www.common.org
SUMMARY:COMMON at TechXchange
DESCRIPTION:Visit COMMON at the IBM TechXChange Event in Mandalay Bay\, October 21 – 24
URL:https://www.common.org/event/common-at-techxchange/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241030T110000
DTEND;TZID=America/Chicago:20241030T120000
DTSTAMP:20260428T154722
CREATED:20241008T152308Z
LAST-MODIFIED:20241008T172052Z
UID:8635-1730286000-1730289600@www.common.org
SUMMARY:POWERcast: 4 Best Practices for Future-Proofing IBM i MFA
DESCRIPTION:Presenter: Lloyd Ramdarie and Ken McCalister\nPrice: Free Courtesy of Software Engineering of America\nDate/Time: October 30\, 2024 @ 11:00AM (CT) \n  \nREGISTER HERE \n  \n4 Best Practices for Future-Proofing IBM i MFA \n  \nMulti-factor authentication (MFA) systems\, while a valuable security measure\, are not without vulnerabilities. Phishing attacks\, SIM swapping\, man-in-the-middle attacks\, MFA fatigue\, and more can still compromise logins. \nJoin SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: \n\nPatching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.\nImmunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.\nIntegrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.\nStrengthening authentication security: Leveraging hard-to-break MFA verification factors.\n\nAll attendees will receive a copy of SEA’s Guide to IBM i Multi-Factor Authentication (MFA)\, an IBM i-specific roadmap and checklist for deploying MFA. \n  \n \nLloyd Ramdarie \nLloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i. \nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment. \n \nKen McCalister \nKen McCalister has spent 35 years working with IBM i technology. Ken has a vast experience working in all aspects of digital technology and management including administration\, engineering\, and security. \nKen is part of the IBM i Technical Team at Software Engineering of America\, providing ongoing support to its many diverse clients.
URL:https://www.common.org/event/powercast-4-best-practices-for-future-proofing-ibm-i-mfa/
LOCATION:Zoom
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241105
DTSTAMP:20260428T154722
CREATED:20241102T163509Z
LAST-MODIFIED:20241102T163509Z
UID:8730-1730678400-1730764799@www.common.org
SUMMARY:N2i Networking and Happy Hour
DESCRIPTION:Join N2i for Happy Hour and Networking 
URL:https://www.common.org/event/n2i-networking-and-happy-hour/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241107
DTSTAMP:20260428T154722
CREATED:20240206T084702Z
LAST-MODIFIED:20240221T044313Z
UID:2755-1730678400-1730937599@www.common.org
SUMMARY:NAViGATE 2024 - Toronto
DESCRIPTION:November 4 – 6\, 2024\nWestin Harbour Castle\nToronto\, Ontario – CANADA
URL:https://www.common.org/event/navigate-2024-toronto/
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250106T170000
DTEND;TZID=America/Chicago:20250106T180000
DTSTAMP:20260428T154722
CREATED:20250102T153815Z
LAST-MODIFIED:20250102T153815Z
UID:9181-1736182800-1736186400@www.common.org
SUMMARY:N2i Happy Hour and Networking
DESCRIPTION:
URL:https://www.common.org/event/n2i-happy-hour-and-networking-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250203T170000
DTEND;TZID=America/Chicago:20250203T180000
DTSTAMP:20260428T154722
CREATED:20250127T220326Z
LAST-MODIFIED:20250127T220326Z
UID:9291-1738602000-1738605600@www.common.org
SUMMARY:N2i: Getting Started with DB2 for i
DESCRIPTION:
URL:https://www.common.org/event/n2i-getting-started-with-db2-for-i/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250224T080000
DTEND;TZID=America/Chicago:20250226T170000
DTSTAMP:20260428T154722
CREATED:20250102T153337Z
LAST-MODIFIED:20250102T153337Z
UID:9177-1740384000-1740589200@www.common.org
SUMMARY:COMMON India
DESCRIPTION:
URL:https://www.common.org/event/common-india/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250225
DTEND;VALUE=DATE:20250228
DTSTAMP:20260428T154722
CREATED:20250102T153023Z
LAST-MODIFIED:20250127T163318Z
UID:9175-1740441600-1740700799@www.common.org
SUMMARY:Focus 2025
DESCRIPTION:
URL:https://www.common.org/event/focus-2025/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260428T154722
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:Join us for your lunch break and network with your peers!
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260428T154722
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250407T170000
DTEND;TZID=America/Chicago:20250407T180000
DTSTAMP:20260428T154722
CREATED:20250317T195445Z
LAST-MODIFIED:20250318T172209Z
UID:9611-1744045200-1744048800@www.common.org
SUMMARY:N2i Presents: Biggest Threats Facing IBM i Security Today
DESCRIPTION:N2i Presents: Biggest Threats Facing IBM i Security Today\nWhat do you mean threats? Everyone’s told me the system is secure?!? Spoiler alert … it’s secure-able. Meaning\, when security is not addressed\, the system can be vulnerable. In this session Carol Woodbury will describe the security threats facing IBM i today. She will describe the threats as well as provide ways to address them. She will also explain how security should be important to everyone – including developers – and what happens when it’s ignored or forgotten.s. \n																														 \nSee what’s next on the n2i calendar here \n					\n									< Back to Events\n					 \nCarol Woodbury is Senior Advisor and IBM i Security SME at Kisco Systems. She started her career at IBM in Rochester\, MN and has helped clients secure IBM i for over 25 years. She has two books\, IBM i Security Administration and Compliance\, 3nd edition and Mastering IBM i Security and has her CISSP and CRISC security certifications. \n					\n									Register
URL:https://www.common.org/event/n2i-presents-biggest-threats-facing-ibm-i-security-today/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250505T123000
DTEND;TZID=America/Chicago:20250505T133000
DTSTAMP:20260428T154722
CREATED:20250318T171610Z
LAST-MODIFIED:20250421T203434Z
UID:9631-1746448200-1746451800@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:Network with your peers and problem solve on your lunch break!  \nSee you there \n  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-2/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250519
DTEND;VALUE=DATE:20250523
DTSTAMP:20260428T154722
CREATED:20240722T143520Z
LAST-MODIFIED:20240722T143520Z
UID:7864-1747612800-1747958399@www.common.org
SUMMARY:POWERUp 2025
DESCRIPTION:Join us in Anaheim California for POWERUp 2025! More information coming soon
URL:https://www.common.org/event/powerup-2025/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250529T110000
DTEND;TZID=America/Chicago:20250529T120000
DTSTAMP:20260428T154722
CREATED:20250422T231515Z
LAST-MODIFIED:20250513T150428Z
UID:9793-1748516400-1748520000@www.common.org
SUMMARY:POWERcast: IBM i Ransomware/Malware Detection and Prevention
DESCRIPTION:Presenters: Ken McCalister and Rick Hengst Price: Free Courtesy of SEADate/Time: May 29th\, 2025 @ 11:00 AM CT \nHow Secure Is Your IBM i Against Ransomware & Malware? \nFailure to quickly detect and respond to IBM i cyberattacks can result in data loss\, reputational damage\, lost revenue\, and other serious consequences. \nJoin SEA on May 29th to learn how to protect your IBM i systems from these growing threats.We’ll share practical strategies and tactics to strengthen your defenses and enhance your response to ransomware and malware attacks including: \n• Identifying vulnerabilities in IBM i systems• Stopping cyberattacks before they reach IBM i servers• Developing effective ransomware and malware prevention strategies• Enabling IBM i protection to detect\, alert\, block\, and report cyberattacks• Recovering from ransomware and malware incidents \nDon’t miss this opportunity to discover how to improve your cybersecurity and protect your IBM i systems from ransomware and malware. \n  \n \nKen McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management\, including Administration\, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft\, providing support to its many diverse clients \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products. \n					\n									Register Today
URL:https://www.common.org/event/ibm-i-ransomware-malware-detection-and-prevention/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250602T170000
DTEND;TZID=America/Chicago:20250602T180000
DTSTAMP:20260428T154722
CREATED:20250318T171859Z
LAST-MODIFIED:20250513T142953Z
UID:9638-1748883600-1748887200@www.common.org
SUMMARY:N2i Getting Started With: Leveraging SQL Services
DESCRIPTION:With every Tech Refresh and OS upgrade\, IBM provides new and updated SQL Services.  These are tools for the developer\, administrator\, and engineer which combine the power of existing APIs with the ease-of-use of SQL.  Whether you’re an expert SQL developer\, or you traditionally use the “greenscreen” for your dev/admin activities\, these IBM i Services can greatly improve your efficiency.  Learn how to use these tools individually and in combination to unlock their full potential!  Bring your questions and any challenges that you’re facing. \nSpeaker: Steve Riedmueller \nBio: Steve has been working on the IBM i platform since 2001. He has developed an expertise in system security\, performance\, communications\, and various IBM and 3rd-party software packages. Steve holds a B.S. from Rutgers University. In recent years Steve has become a COMMON and WMCPA speaker\, an N2i mentor\, and the N2i committee lead. In the world of IBM i technology\, Steve is passionate about process improvement. He enjoys leveraging IBM i SQL Services for administration/operations tasks such as security and performance\, as well as automation. \n  \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250625T120000
DTEND;TZID=America/Chicago:20250625T130000
DTSTAMP:20260428T154722
CREATED:20250604T143333Z
LAST-MODIFIED:20250617T151958Z
UID:10007-1750852800-1750856400@www.common.org
SUMMARY:Cyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads
DESCRIPTION:Presenters: \nTony Fiorot\, IBM – Cloud Solution Sales Executive\, Power Systems Virtual Server\nRichard R. Spurlock\, Cobalt Iron – CEO and Founder\nMatt Dittoe\, Cobalt Iron – Vice President of Sales \nPrice: Free Courtesy of Cobalt Iron \nDate/Time: June 25th\, 2025 @ 12:00 PM CT \nCyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads \nAre backup challenges and security complexities leaving you frustrated or overwhelmed? If so\, you won’t want to miss this discussion! \nOur panel of experts will explore three customer use cases including specific challenges\, overview of solution patterns\, and the impacts of Compass Secure Automated Backup. \nCustomer Challenges Explored: \n\nChallenge #1 – Reduce risk moving on-premises Power workloads to the cloud\n\nChallenge #2 – Hybrid data protection\n\nChallenge #3 – Unify protection for Power and x86 workloads (VMware\, KVM\, etc.)\n\n  \n Register Today  \n \nTony Fiorot \nTony is a dynamic leader with a passion for guiding teams and customers through transformational change and the adoption of emerging technologies. With deep expertise in solution sales\, business transformation\, and Go-To-Market strategies\, Tony has helped organizations unlock the full potential of cloud services\, artificial intelligence\, and digital user experiences. He is highly skilled in security and privacy by design\, data protection\, enterprise content management\, workflow optimization\, strategic planning\, consulting\, and financial analysis. \nKnown for his ability to make complex technical topics accessible and engaging\, Tony combines technical mastery with an energetic\, approachable style that resonates with diverse audiences. Tony’s outstanding contributions have been recognized with the prestigious Best of IBM Award in 2018. \n  \n \nRichard R. Spurlock \nIntellectually curious entrepreneur\, Richard is recognized as a global expert on data protection and recovery. After spending 15 years designing and delivering the world’s largest data protection applications\, Richard harnessed that expertise to build a disruptive\, software-defined data protection solution: Compass. Compass is the industry’s first enterprise-class data protection and analytics software designed to natively run in hybrid and public cloud environments. An experienced speaker and subject matter expert\, Richard is a frequent industry spokesman and an avid Formula 1 racing fan with his family. \n  \n \nMatt Dittoe  \nA former developer\, architect\, and systems engineer\, Matt has deep infrastructure knowledge and experience that he brings to solution sales and customer engagement.  He has held a series of leadership positions at Amazon Web Services\, Oracle\, SolarWinds\, Hewlett Packard\, and at Cobalt Iron\, where he currently serves as Vice President of Sales.
URL:https://www.common.org/event/cyber-resilient-backup-patterns-for-ibm-power-vs-and-hybrid-workloads/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250707T123000
DTEND;TZID=America/Chicago:20250707T133000
DTSTAMP:20260428T154722
CREATED:20250318T171733Z
LAST-MODIFIED:20250609T144634Z
UID:9636-1751891400-1751895000@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:Come network with your peers during your lunch hour! \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-3/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250908T170000
DTEND;TZID=America/Chicago:20250908T180000
DTSTAMP:20260428T154722
CREATED:20250701T190014Z
LAST-MODIFIED:20250717T201437Z
UID:10256-1757350800-1757354400@www.common.org
SUMMARY:N2i: Forget ODBC! Here's a New Db2 Connector
DESCRIPTION:N2i: Forget ODBC! Here’s a New Db2 Connector \nSpeaker: Jonathan ZakWhen: September 8\, 5:00 p.m. – 6:00 p.m. CT \nConnecting to Db2 has never been easier or more efficient. Join us for an in-depth session on Mapepire\, a powerful open-source library designed to simplify and enhance your Db2 database interactions. This library offers a more straightforward alternative to traditional JDBC or ODBC connections\, ensuring developers can achieve optimal performance and scalability without the usual complexity.  \n					\n									Register
URL:https://www.common.org/event/n2i-db2connector/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250910T110000
DTEND;TZID=America/Chicago:20250910T120000
DTSTAMP:20260428T154722
CREATED:20250822T184105Z
LAST-MODIFIED:20250822T184715Z
UID:10628-1757502000-1757505600@www.common.org
SUMMARY:POWERcast: Sizing Power11 Correctly with Performance Navigator
DESCRIPTION:Presenters: Chuck Losinski and Randy WatsonPrice: Free Courtesy of FortraDate/Time: September 10th\, 2025 @ 11:00 AM CT \nSizing Power11 Correctly with Performance Navigator  \nIBM Power11 technology is here for running IBM i\, AIX\, and Linux workloads.  Performance Navigator is ready to help you plan your move to your next Power Server\, whether it’s on-premises\, dynamic capacity on-premises (PEP2)\, or in the cloud. \nPerformance Navigator is the only tool that can predict the exact model\, processor\, memory\, storage\, PowerVM settings\, and VIOS needs for IBM Power 9\, Power 10\, and now Power 11.  Join Fortra Power server experts Randy Watson and Chuck Losinski as they discuss: \n\nWhat’s new with Power 11 and how it affects capacity planning\nWhat is available for Power11 planning\nWhat you need to provide Fortra for a detailed Capacity Plan\nHow this service is used by most IBM resellers around the globe\n\nYou will learn the steps for proper capacity planning in a live demonstration and how this will save you in the future! \n  \n \nChuck Losinski\, Director of Technical Solutions for the Robot product line\, has been with Fortra for over 25 years. He has over 40 years of experience in IT\, including 30+ years on the IBM i platform. \nChuck’s background covers a wide variety of technical responsibilities\, involving system implementation\, programming\, operations\, training and support. Chuck has helped numerous customers automate their IBM i business applications\, processes\, and monitoring. Also\, he is on the advisory board of the IBM i user group\, QUSER. \n  \n \nRandy Watson is a capacity and performance analysis expert and offers consulting services around the Performance Navigator software. Before teaming up with Fortra\, Randy was President and Co-Founder of Midrange Performance Group\, Inc. (MPG) before Fortra acquired the company in August 2018. \nHe has been working in the IT industry for nearly 50 years\, focusing primarily on performance and capacity planning. The last two decades have been spent helping IBM\, IBM business partners\, and customers manage and analyze performance and capacity on the Power Systems platform for IBM i\, AIX\, VIOS\, and Linux\, having most recently added analyzing AI/ML Power environments by monitory GPU metrics. Randy graduated from Eastern New Mexico University with a Bachelor of Business Administration in 1972. \n					\n									Register Today
URL:https://www.common.org/event/powercast-sizing-power11-correctly-with-performance-navigator/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250915T080000
DTEND;TZID=America/Chicago:20250917T123000
DTSTAMP:20260428T154722
CREATED:20250106T162744Z
LAST-MODIFIED:20250827T140842Z
UID:9202-1757923200-1758112200@www.common.org
SUMMARY:NAViGATE 2025
DESCRIPTION:PAGE IN PROGRESS\nNAViGATE 2025 \nWhere: Pittsburgh Pennsylvania \nWhen: September 15 – 17  \nMore Details coming soon!
URL:https://www.common.org/event/navigate-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250924T110000
DTEND;TZID=America/Chicago:20250924T120000
DTSTAMP:20260428T154722
CREATED:20250905T130340Z
LAST-MODIFIED:20250918T150510Z
UID:10682-1758711600-1758715200@www.common.org
SUMMARY:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data
DESCRIPTION:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data\nDate: September 24\, 2025Time: 11:00 AM – 12:00 PM (CT)Speaker: Nikhil Sama \nAI is everywhere\, but how does it actually apply to IBMi? In this session\, we’ll cut through the buzzwords to show you how AI agents can “speak IBMi” and transform your decades of business-critical data into modern analytics. \nWhat You’ll Learn: \n– Why unlocking IBMi data is critical for competitive advantage and operational efficiency \n– How agentic AI can decode the semantic structure of IBMi data: from cryptic table names and journals to business meaning \n– Practical techniques for building AI agents that understand IBMi’s unique data language \n– How to orchestrate modern data pipelines into platforms like Snowflake\, Databricks\, Tableau and Thoughtspot \n– Smart automation strategies for translating from IBMi’s native structures to contemporary analytics frameworks \nYour IBMi data speaks a unique language packed with decades of business logic\, journals\, and custom code. Now AI agents can finally understand it. Join us to discover how to harness this understanding to automate pipelines\, accelerate reporting\, and deliver a practical roadmap with real examples that unlock immediate business value from your IBMi infrastructure. \n					\n									Register\n					\n																														 \nNikhil is the Founder and CTO of Turgon AI\, a Silicon Valley startup building an agentic platform to help companies modernize their data infrastructure\, accelerate data migration / integrations and generate revenue and operational insights. He’s a serial entrepreneur\, with a proven track record of building AI + Expert Human based services to unlock business value. 
URL:https://www.common.org/event/powercast-turgon-ai/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251006
DTEND;VALUE=DATE:20251010
DTSTAMP:20260428T154722
CREATED:20250617T174210Z
LAST-MODIFIED:20250617T174210Z
UID:10130-1759708800-1760054399@www.common.org
SUMMARY:IBM TechXChange 2025
DESCRIPTION:
URL:https://www.common.org/event/ibm-techxchange-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251013T123000
DTEND;TZID=America/Chicago:20251013T133000
DTSTAMP:20260428T154722
CREATED:20250911T191448Z
LAST-MODIFIED:20250911T191906Z
UID:10738-1760358600-1760362200@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nJoin the N2i community for an hour of learning and networking with your peers!  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T110000
DTEND;TZID=America/Chicago:20251016T120000
DTSTAMP:20260428T154722
CREATED:20250924T195934Z
LAST-MODIFIED:20251015T115919Z
UID:10839-1760612400-1760616000@www.common.org
SUMMARY:POWERcast: Using IBM i Self-Service Password Reset to Reduce Costs\, Improve Security
DESCRIPTION:Presenters: Rick Hengst Price: Free Courtesy of SEADate/Time: October 16\, 2025 @ 11:00 AM CT \nUsing IBM i Self-Service Password Reset to Reduce Costs\, Improve Security \nSEA’s IBM i experts demonstrate how to solve common IBM i password management issues by implementing IBM i Self-Service Password Reset (SSPR).  \nWe’ll explore how IBM i SSPR solutions can increase security\, reduce costs\, improve productivity\, avoid risks\, and meet compliance requirements by:• Avoiding IBM i password phishing attacks and other cybersecurity risks• Significantly reducing IBM i support costs• Helping meet MFA and other compliance requirements • Demonstrating features and best practices for deploying SSPR on IBM i systems \nJoin SEA on October 16th\, 11am CT to discover how to increase user productivity\, efficiency\, and security by using SSPR for IBM i \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products.  \n					\n									Register
URL:https://www.common.org/event/powercast-using-ibm-i-self-service-password-reset-to-reduce-costs-improve-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251029T110000
DTEND;TZID=America/Chicago:20251029T120000
DTSTAMP:20260428T154722
CREATED:20251013T183538Z
LAST-MODIFIED:20251017T221433Z
UID:11010-1761735600-1761739200@www.common.org
SUMMARY:POWERcast : Security & Quality Without Compromise—See What’s Next for IBM i
DESCRIPTION:Presenters: Chris White\, Herman Rensink\, & Andy FinleyPrice: Free Courtesy of Rocket SoftwareDate/Time: October 29\, 2025 @ 11:00 AM CT \nSecurity & Quality Without Compromise—See What’s Next for IBM i \nJoin us for a powerful and forward-looking webinar hosted by Rocket Software in partnership with COMMON\, where we’ll explore two of the most critical priorities in modern IBM i development: security and quality. \nYou’ll hear directly from Rocket Software experts: Chris White\, Herman Rensink\, & Andy Finley. \nTogether\, they’ll share practical strategies and insights to help you: \n\nImplement shift-left practices that catch issues earlier and reduce risk\nStrengthen security around database access\, compliance\, and control\nApply efficient testing approaches that preserve performance and user trust\n\nPlus\, you’ll get an exclusive first look at the November release of Rocket® DevOps Insights (RDOi)—designed to help developers\, testers\, and IT leaders stay ahead of evolving challenges. \nJoin us for this insightful session and take the next step toward more secure\, resilient development practices. \n					\n									Register\n					 \n \nChris WhiteProduct Manager\, Rocket® DevOps \n \nAndy FinleySales Engineer \n \nHerman RensinkDistinguished Engineer
URL:https://www.common.org/event/powercast-security-quality-without-compromise-see-whats-next-for-ibm-i/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251103T170000
DTEND;TZID=America/Chicago:20251103T180000
DTSTAMP:20260428T154722
CREATED:20250728T152959Z
LAST-MODIFIED:20251006T110830Z
UID:10477-1762189200-1762192800@www.common.org
SUMMARY:N2i Getting Started With: How to Get Oriented on this Weird Platform
DESCRIPTION:N2i Getting Started With: How to Get Oriented on this Weird Platform\nSpeaker: Jack WoehrDate: November 3 \nJack will present on “Getting Started: How to get oriented on this weird platform”. IBM i and IBM mainframes continue over 60 years since their inception to represent a valid approach to business computing\, despite having often followed Yogi Berra’s proverbial advice\, “When you come to a fork in the road\, take it!” \nJack came from open source and personal computers to the IBM i environment and will share about the nature of and reasons for the differences between the IBM “big iron” approach environment and what we’re all used to from our personal computers and web servers. He’ll help you get oriented so the features of IBM i which are stumbling blocks to newcomers become instead stepping stones to a deeper understanding of enterprise computing in the world of big business. \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-how-to-get-oriented-on-this-weird-platform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251119T110000
DTEND;TZID=America/Chicago:20251119T120000
DTSTAMP:20260428T154722
CREATED:20251106T220106Z
LAST-MODIFIED:20251119T181320Z
UID:11249-1763550000-1763553600@www.common.org
SUMMARY:POWERcast - IFS Security: Don’t Leave Your Server Vulnerable
DESCRIPTION:IFS Security: Don’t Leave Your Server Vulnerable\nSpeaker: Sandi MooreDate: November 19\, 11:00 AM CT \nExperts agree that one of the most overlooked areas of IBM i security is the Integrated File System (IFS). But it needs to be secure because the IFS provides access for users carrying nothing more than a user profile and password! \nIf you believe nothing important is stored on your server’s IFS\, think again\, because it’s a conduit to many things\, including the Operating System and all of your application libraries and files. \nJoin IBM Champion and security expert Sandi Moore to learn about securing the IFS\, including: \n\nWhy we care about the IFS\nPermissions versus Authority\nRoot folder access\nAuditing IFS activities\nRead/write versus *ALLOBJ\nAntivirus considerations\n\n					\n									Register\n					\n																														 \nFree Courtesy Of:\n															\n																														 \nAbout Sandi Moore \nSandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i\, AIX\, and Linux\, she has been involved in product demonstrations\, implementation\, support\, training\, research\, and product testing. Sandi is also a Certified Professional Forensics Analyst (CPFA)\,a Certified Data Privacy Practitioner (CDPP)\, and Secured Cloud Computing Practitioner (SCCP). \nIn her time at Fortra\, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems\, no matter how many servers are in their environment or where in the world they’re located.
URL:https://www.common.org/event/powercast-ifs-security-dont-leave-your-server-vulnerable/
END:VEVENT
END:VCALENDAR