BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20230312T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20231105T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260430T105303
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260430T105304
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250225
DTEND;VALUE=DATE:20250228
DTSTAMP:20260430T105304
CREATED:20250102T153023Z
LAST-MODIFIED:20250127T163318Z
UID:9175-1740441600-1740700799@www.common.org
SUMMARY:Focus 2025
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/focus-2025/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250224T080000
DTEND;TZID=America/Chicago:20250226T170000
DTSTAMP:20260430T105304
CREATED:20250102T153337Z
LAST-MODIFIED:20250102T153337Z
UID:9177-1740384000-1740589200@www.common.org
SUMMARY:COMMON India
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-india/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250203T170000
DTEND;TZID=America/Chicago:20250203T180000
DTSTAMP:20260430T105304
CREATED:20250127T220326Z
LAST-MODIFIED:20250127T220326Z
UID:9291-1738602000-1738605600@www.common.org
SUMMARY:N2i: Getting Started with DB2 for i
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-db2-for-i/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250106T170000
DTEND;TZID=America/Chicago:20250106T180000
DTSTAMP:20260430T105304
CREATED:20250102T153815Z
LAST-MODIFIED:20250102T153815Z
UID:9181-1736182800-1736186400@www.common.org
SUMMARY:N2i Happy Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-happy-hour-and-networking-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241107
DTSTAMP:20260430T105304
CREATED:20240206T084702Z
LAST-MODIFIED:20240221T044313Z
UID:2755-1730678400-1730937599@www.common.org
SUMMARY:NAViGATE 2024 - Toronto
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/navigate-2024-toronto/
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241104
DTEND;VALUE=DATE:20241105
DTSTAMP:20260430T105304
CREATED:20241102T163509Z
LAST-MODIFIED:20241102T163509Z
UID:8730-1730678400-1730764799@www.common.org
SUMMARY:N2i Networking and Happy Hour
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-networking-and-happy-hour/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241030T110000
DTEND;TZID=America/Chicago:20241030T120000
DTSTAMP:20260430T105304
CREATED:20241008T152308Z
LAST-MODIFIED:20241008T172052Z
UID:8635-1730286000-1730289600@www.common.org
SUMMARY:POWERcast: 4 Best Practices for Future-Proofing IBM i MFA
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-4-best-practices-for-future-proofing-ibm-i-mfa/
LOCATION:Zoom
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20241021
DTEND;VALUE=DATE:20241025
DTSTAMP:20260430T105304
CREATED:20240903T201351Z
LAST-MODIFIED:20240903T201351Z
UID:8341-1729468800-1729814399@www.common.org
SUMMARY:COMMON at TechXchange
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-at-techxchange/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241016T100000
DTEND;TZID=America/Chicago:20241016T150000
DTSTAMP:20260430T105304
CREATED:20241004T152735Z
LAST-MODIFIED:20241004T152735Z
UID:8546-1729072800-1729090800@www.common.org
SUMMARY:IBM i Data from the Ground Up: Cybersecurity\, Operations\, Data Access and Management
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/ibm-i-data-from-the-ground-up-cybersecurity-operations-data-access-and-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20241007T170000
DTEND;TZID=America/Chicago:20241007T180000
DTSTAMP:20260430T105304
CREATED:20240730T173806Z
LAST-MODIFIED:20240805T221144Z
UID:7951-1728320400-1728324000@www.common.org
SUMMARY:N2i: Getting Started with Modern RPG Arrays and BiFs
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-on-rpg-bifs/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240916
DTEND;VALUE=DATE:20240919
DTSTAMP:20260430T105304
CREATED:20240205T084315Z
LAST-MODIFIED:20240708T143137Z
UID:2752-1726444800-1726703999@www.common.org
SUMMARY:NAViGATE 2024 - Florida
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/navigate-2024-florida/
LOCATION:Hyatt Regency Coconut Point\, 5001 Coconut Rd\, Bonita Springs\, FL\, 34134\, United States
CATEGORIES:NAViGATE
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240905T090000
DTEND;TZID=America/Chicago:20240905T160000
DTSTAMP:20260430T105304
CREATED:20240813T165227Z
LAST-MODIFIED:20240813T165227Z
UID:8225-1725526800-1725552000@www.common.org
SUMMARY:COMMON Latin America IBM i Virtual Conference
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-latin-america-ibm-i-virtual-conference/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240814T090000
DTEND;TZID=America/Chicago:20240814T100000
DTSTAMP:20260430T105304
CREATED:20240715T184031Z
LAST-MODIFIED:20240718T161500Z
UID:7612-1723626000-1723629600@www.common.org
SUMMARY:IBM Webinar: IBM i Large User Group (LUG) review process for IBM i ISV software
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/ibm-webinar-ibm-i-large-user-group-lug-review-process-for-ibm-i-isv-software/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240724T110000
DTEND;TZID=America/Chicago:20240724T120000
DTSTAMP:20260430T105304
CREATED:20240626T213459Z
LAST-MODIFIED:20240708T143236Z
UID:7250-1721818800-1721822400@www.common.org
SUMMARY:POWERcast: How Protected is Your IBM i in the Event of Disaster?
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/7250/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240715T170000
DTEND;TZID=America/Chicago:20240715T180000
DTSTAMP:20260430T105304
CREATED:20240319T211247Z
LAST-MODIFIED:20240708T143258Z
UID:6272-1721062800-1721066400@www.common.org
SUMMARY:N2i Happy Hour and Networking!
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-happy-hour-and-networking/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240620T110000
DTEND;TZID=America/Chicago:20240620T120000
DTSTAMP:20260430T105304
CREATED:20240603T151446Z
LAST-MODIFIED:20240626T211428Z
UID:6721-1718881200-1718884800@www.common.org
SUMMARY:POWERcast: Be a Catalyst: Unlocking the Power of IBM in the Cloud
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-be-a-catalyst-unlocking-the-power-of-ibm-in-the-cloud/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240610T170000
DTEND;TZID=America/Chicago:20240610T180000
DTSTAMP:20260430T105304
CREATED:20240319T211141Z
LAST-MODIFIED:20240319T211556Z
UID:6269-1718038800-1718042400@www.common.org
SUMMARY:N2i: Getting Started with OS Installs and PTFs
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20240520
DTEND;VALUE=DATE:20240524
DTSTAMP:20260430T105304
CREATED:20240205T015050Z
LAST-MODIFIED:20240212T125313Z
UID:1461-1716163200-1716508799@www.common.org
SUMMARY:POWERUp 2024
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powerup-2024/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240508T100000
DTEND;TZID=America/Chicago:20240508T110000
DTSTAMP:20260430T105304
CREATED:20240417T164439Z
LAST-MODIFIED:20240417T170627Z
UID:6435-1715162400-1715166000@www.common.org
SUMMARY:POWERcast: How to Choose the Best API Management Deployment Options
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-how-to-choose-the-best-api-management-deployment-options/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240506T170000
DTEND;TZID=America/Chicago:20240506T180000
DTSTAMP:20260430T105304
CREATED:20240319T205935Z
LAST-MODIFIED:20240319T211602Z
UID:6266-1715014800-1715018400@www.common.org
SUMMARY:N2i: Getting Started with Performance - Dawn May
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-performance-dawn-may/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240415T170000
DTEND;TZID=America/Chicago:20240415T170000
DTSTAMP:20260430T105304
CREATED:20240319T205606Z
LAST-MODIFIED:20240408T162930Z
UID:6264-1713200400-1713200400@www.common.org
SUMMARY:N2i: Getting Started with System Administration
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-system-administration/
CATEGORIES:N2i
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240327T110000
DTEND;TZID=America/Chicago:20240327T120000
DTSTAMP:20260430T105304
CREATED:20240306T183410Z
LAST-MODIFIED:20240603T151835Z
UID:6001-1711537200-1711540800@www.common.org
SUMMARY:POWERCast: Leverage IBM i Monitoring for Process Improvement
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-leverage-ibm-i-monitoring-for-process-improvement/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240321T110000
DTEND;TZID=America/Chicago:20240321T120000
DTSTAMP:20260430T105304
CREATED:20240306T161739Z
LAST-MODIFIED:20240519T175122Z
UID:5988-1711018800-1711022400@www.common.org
SUMMARY:POWERCast: Db2 Web Query Alternative - See m-Power in Action
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-db2-web-query-alternative-see-m-power-in-action/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240318T170000
DTEND;TZID=America/Chicago:20240318T180000
DTSTAMP:20260430T105304
CREATED:20240315T214513Z
LAST-MODIFIED:20240315T214513Z
UID:6225-1710781200-1710784800@www.common.org
SUMMARY:N2i Networking Happy Hour
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-networking-happy-hour/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240308T170000
DTEND;TZID=America/Chicago:20240308T180000
DTSTAMP:20260430T105304
CREATED:20240204T024458Z
LAST-MODIFIED:20240222T011625Z
UID:1514-1709917200-1709920800@www.common.org
SUMMARY:N2i: Getting Started with OS installs and PTFS - Speaker TBD
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-os-installs-and-ptfs-speaker-tbd/
CATEGORIES:N2i,Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240228T110000
DTEND;TZID=America/Chicago:20240228T120000
DTSTAMP:20260430T105304
CREATED:20240203T032210Z
LAST-MODIFIED:20240203T033109Z
UID:1567-1709118000-1709121600@www.common.org
SUMMARY:POWERCast: Along the DevOps Road - Stories of Evolution
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-along-the-devops-road-stories-of-evolution/
CATEGORIES:Web
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20240212T170000
DTEND;TZID=America/Chicago:20240212T180000
DTSTAMP:20260430T105304
CREATED:20240201T085929Z
LAST-MODIFIED:20240222T011443Z
UID:2763-1707757200-1707760800@www.common.org
SUMMARY:N2i: Getting Started with AI: Mark Irish
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-ai-mark-irish/
CATEGORIES:N2i,Web
END:VEVENT
END:VCALENDAR