BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240321T110000
DTEND;TZID=America/Chicago:20240321T120000
DTSTAMP:20260430T205943
CREATED:20240306T161739Z
LAST-MODIFIED:20240519T175122Z
UID:5988-1711018800-1711022400@www.common.org
SUMMARY:POWERCast: Db2 Web Query Alternative - See m-Power in Action
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-db2-web-query-alternative-see-m-power-in-action/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240318T170000
DTEND;TZID=America/Chicago:20240318T180000
DTSTAMP:20260430T205943
CREATED:20240315T214513Z
LAST-MODIFIED:20240315T214513Z
UID:6225-1710781200-1710784800@www.common.org
SUMMARY:N2i Networking Happy Hour
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-networking-happy-hour/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240308T170000
DTEND;TZID=America/Chicago:20240308T180000
DTSTAMP:20260430T205943
CREATED:20240204T024458Z
LAST-MODIFIED:20240222T011625Z
UID:1514-1709917200-1709920800@www.common.org
SUMMARY:N2i: Getting Started with OS installs and PTFS - Speaker TBD
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs-speaker-tbd/
CATEGORIES:N2i,Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240228T110000
DTEND;TZID=America/Chicago:20240228T120000
DTSTAMP:20260430T205943
CREATED:20240203T032210Z
LAST-MODIFIED:20240203T033109Z
UID:1567-1709118000-1709121600@www.common.org
SUMMARY:POWERCast: Along the DevOps Road - Stories of Evolution
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-along-the-devops-road-stories-of-evolution/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240212T170000
DTEND;TZID=America/Chicago:20240212T180000
DTSTAMP:20260430T205943
CREATED:20240201T085929Z
LAST-MODIFIED:20240222T011443Z
UID:2763-1707757200-1707760800@www.common.org
SUMMARY:N2i: Getting Started with AI: Mark Irish
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-ai-mark-irish/
CATEGORIES:N2i,Web
END:VEVENT
END:VCALENDAR