BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250303T123000
DTEND;TZID=America/Chicago:20250303T133000
DTSTAMP:20260428T154749
CREATED:20250303T135118Z
LAST-MODIFIED:20250303T135118Z
UID:9546-1741005000-1741008600@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250305T090000
DTEND;TZID=America/Chicago:20250305T140000
DTSTAMP:20260428T154749
CREATED:20250303T133815Z
LAST-MODIFIED:20250303T133815Z
UID:9541-1741165200-1741183200@www.common.org
SUMMARY:COMMON Latin America
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-latin-america/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250407T170000
DTEND;TZID=America/Chicago:20250407T180000
DTSTAMP:20260428T154749
CREATED:20250317T195445Z
LAST-MODIFIED:20250318T172209Z
UID:9611-1744045200-1744048800@www.common.org
SUMMARY:N2i Presents: Biggest Threats Facing IBM i Security Today
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-presents-biggest-threats-facing-ibm-i-security-today/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250505T123000
DTEND;TZID=America/Chicago:20250505T133000
DTSTAMP:20260428T154749
CREATED:20250318T171610Z
LAST-MODIFIED:20250421T203434Z
UID:9631-1746448200-1746451800@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-2/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250519
DTEND;VALUE=DATE:20250523
DTSTAMP:20260428T154750
CREATED:20240722T143520Z
LAST-MODIFIED:20240722T143520Z
UID:7864-1747612800-1747958399@www.common.org
SUMMARY:POWERUp 2025
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powerup-2025/
CATEGORIES:In Person
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250529T110000
DTEND;TZID=America/Chicago:20250529T120000
DTSTAMP:20260428T154750
CREATED:20250422T231515Z
LAST-MODIFIED:20250513T150428Z
UID:9793-1748516400-1748520000@www.common.org
SUMMARY:POWERcast: IBM i Ransomware/Malware Detection and Prevention
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/ibm-i-ransomware-malware-detection-and-prevention/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250602T170000
DTEND;TZID=America/Chicago:20250602T180000
DTSTAMP:20260428T154750
CREATED:20250318T171859Z
LAST-MODIFIED:20250513T142953Z
UID:9638-1748883600-1748887200@www.common.org
SUMMARY:N2i Getting Started With: Leveraging SQL Services
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250625T120000
DTEND;TZID=America/Chicago:20250625T130000
DTSTAMP:20260428T154750
CREATED:20250604T143333Z
LAST-MODIFIED:20250617T151958Z
UID:10007-1750852800-1750856400@www.common.org
SUMMARY:Cyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/cyber-resilient-backup-patterns-for-ibm-power-vs-and-hybrid-workloads/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250707T123000
DTEND;TZID=America/Chicago:20250707T133000
DTSTAMP:20260428T154750
CREATED:20250318T171733Z
LAST-MODIFIED:20250609T144634Z
UID:9636-1751891400-1751895000@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-3/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250908T170000
DTEND;TZID=America/Chicago:20250908T180000
DTSTAMP:20260428T154750
CREATED:20250701T190014Z
LAST-MODIFIED:20250717T201437Z
UID:10256-1757350800-1757354400@www.common.org
SUMMARY:N2i: Forget ODBC! Here's a New Db2 Connector
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-db2connector/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250910T110000
DTEND;TZID=America/Chicago:20250910T120000
DTSTAMP:20260428T154750
CREATED:20250822T184105Z
LAST-MODIFIED:20250822T184715Z
UID:10628-1757502000-1757505600@www.common.org
SUMMARY:POWERcast: Sizing Power11 Correctly with Performance Navigator
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-sizing-power11-correctly-with-performance-navigator/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250915T080000
DTEND;TZID=America/Chicago:20250917T123000
DTSTAMP:20260428T154750
CREATED:20250106T162744Z
LAST-MODIFIED:20250827T140842Z
UID:9202-1757923200-1758112200@www.common.org
SUMMARY:NAViGATE 2025
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/navigate-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250924T110000
DTEND;TZID=America/Chicago:20250924T120000
DTSTAMP:20260428T154750
CREATED:20250905T130340Z
LAST-MODIFIED:20250918T150510Z
UID:10682-1758711600-1758715200@www.common.org
SUMMARY:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-turgon-ai/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251006
DTEND;VALUE=DATE:20251010
DTSTAMP:20260428T154750
CREATED:20250617T174210Z
LAST-MODIFIED:20250617T174210Z
UID:10130-1759708800-1760054399@www.common.org
SUMMARY:IBM TechXChange 2025
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/ibm-techxchange-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251013T123000
DTEND;TZID=America/Chicago:20251013T133000
DTSTAMP:20260428T154750
CREATED:20250911T191448Z
LAST-MODIFIED:20250911T191906Z
UID:10738-1760358600-1760362200@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T110000
DTEND;TZID=America/Chicago:20251016T120000
DTSTAMP:20260428T154750
CREATED:20250924T195934Z
LAST-MODIFIED:20251015T115919Z
UID:10839-1760612400-1760616000@www.common.org
SUMMARY:POWERcast: Using IBM i Self-Service Password Reset to Reduce Costs\, Improve Security
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-using-ibm-i-self-service-password-reset-to-reduce-costs-improve-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251029T110000
DTEND;TZID=America/Chicago:20251029T120000
DTSTAMP:20260428T154750
CREATED:20251013T183538Z
LAST-MODIFIED:20251017T221433Z
UID:11010-1761735600-1761739200@www.common.org
SUMMARY:POWERcast : Security & Quality Without Compromise—See What’s Next for IBM i
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-security-quality-without-compromise-see-whats-next-for-ibm-i/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251103T170000
DTEND;TZID=America/Chicago:20251103T180000
DTSTAMP:20260428T154750
CREATED:20250728T152959Z
LAST-MODIFIED:20251006T110830Z
UID:10477-1762189200-1762192800@www.common.org
SUMMARY:N2i Getting Started With: How to Get Oriented on this Weird Platform
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-how-to-get-oriented-on-this-weird-platform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251119T110000
DTEND;TZID=America/Chicago:20251119T120000
DTSTAMP:20260428T154750
CREATED:20251106T220106Z
LAST-MODIFIED:20251119T181320Z
UID:11249-1763550000-1763553600@www.common.org
SUMMARY:POWERcast - IFS Security: Don’t Leave Your Server Vulnerable
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-ifs-security-dont-leave-your-server-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251201T123000
DTEND;TZID=America/Chicago:20251201T133000
DTSTAMP:20260428T154750
CREATED:20251104T194331Z
LAST-MODIFIED:20251112T180417Z
UID:11221-1764592200-1764595800@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-5/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251216T110000
DTEND;TZID=America/Chicago:20251216T120000
DTSTAMP:20260428T154750
CREATED:20251208T105151Z
LAST-MODIFIED:20251209T142147Z
UID:11476-1765882800-1765886400@www.common.org
SUMMARY:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-how-to-avoid-the-biggest-mistakes-in-ibm-i-security/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260112T140000
DTEND;TZID=America/Chicago:20260112T150000
DTSTAMP:20260428T154750
CREATED:20250814T193140Z
LAST-MODIFIED:20260107T184943Z
UID:10541-1768226400-1768230000@www.common.org
SUMMARY:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-fortify-and-conquer-secure-coding-strategies-for-ibm-i-developers/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260202
DTEND;VALUE=DATE:20260204
DTSTAMP:20260428T154750
CREATED:20260112T210121Z
LAST-MODIFIED:20260112T210121Z
UID:11755-1769990400-1770163199@www.common.org
SUMMARY:COMMON India
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-india-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260202T123000
DTEND;TZID=America/Chicago:20260202T133000
DTSTAMP:20260428T154750
CREATED:20260112T203231Z
LAST-MODIFIED:20260112T205423Z
UID:11737-1770035400-1770039000@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-6/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260217
DTEND;VALUE=DATE:20260219
DTSTAMP:20260428T154750
CREATED:20260107T142252Z
LAST-MODIFIED:20260107T143259Z
UID:11663-1771286400-1771459199@www.common.org
SUMMARY:Focus 2026
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/focus-2026/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260309T120000
DTEND;TZID=America/Chicago:20260309T130000
DTSTAMP:20260428T154750
CREATED:20260302T160413Z
LAST-MODIFIED:20260309T153333Z
UID:12102-1773057600-1773061200@www.common.org
SUMMARY:N2i: AI with IBM i Overview
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-ai-with-ibm-i-overview/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260310T080000
DTEND;TZID=America/Chicago:20260310T170000
DTSTAMP:20260428T154750
CREATED:20260209T163235Z
LAST-MODIFIED:20260209T163235Z
UID:11964-1773129600-1773162000@www.common.org
SUMMARY:COMMON at WMPCA
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-at-wmpca/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T110000
DTEND;TZID=America/Chicago:20260319T120000
DTSTAMP:20260428T154750
CREATED:20260226T160155Z
LAST-MODIFIED:20260306T133755Z
UID:12061-1773918000-1773921600@www.common.org
SUMMARY:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-working-together-on-ibm-i-git-change-management-for-innovative-ibm-i-devops/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260406T123000
DTEND;TZID=America/Chicago:20260406T133000
DTSTAMP:20260428T154750
CREATED:20260224T172154Z
LAST-MODIFIED:20260325T171949Z
UID:12024-1775478600-1775482200@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-7/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260428T154750
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/neugc/
END:VEVENT
END:VCALENDAR