BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260217
DTEND;VALUE=DATE:20260219
DTSTAMP:20260430T105930
CREATED:20260107T142252Z
LAST-MODIFIED:20260107T143259Z
UID:11663-1771286400-1771459199@www.common.org
SUMMARY:Focus 2026
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/focus-2026/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260309T120000
DTEND;TZID=America/Chicago:20260309T130000
DTSTAMP:20260430T105930
CREATED:20260302T160413Z
LAST-MODIFIED:20260309T153333Z
UID:12102-1773057600-1773061200@www.common.org
SUMMARY:N2i: AI with IBM i Overview
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-ai-with-ibm-i-overview/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260310T080000
DTEND;TZID=America/Chicago:20260310T170000
DTSTAMP:20260430T105931
CREATED:20260209T163235Z
LAST-MODIFIED:20260209T163235Z
UID:11964-1773129600-1773162000@www.common.org
SUMMARY:COMMON at WMPCA
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-at-wmpca/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T110000
DTEND;TZID=America/Chicago:20260319T120000
DTSTAMP:20260430T105931
CREATED:20260226T160155Z
LAST-MODIFIED:20260306T133755Z
UID:12061-1773918000-1773921600@www.common.org
SUMMARY:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-working-together-on-ibm-i-git-change-management-for-innovative-ibm-i-devops/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260406T123000
DTEND;TZID=America/Chicago:20260406T133000
DTSTAMP:20260430T105931
CREATED:20260224T172154Z
LAST-MODIFIED:20260325T171949Z
UID:12024-1775478600-1775482200@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-7/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260430T105931
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/neugc/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260427
DTEND;VALUE=DATE:20260501
DTSTAMP:20260430T105931
CREATED:20250914T170030Z
LAST-MODIFIED:20250915T173913Z
UID:10745-1777248000-1777593599@www.common.org
SUMMARY:POWERUp 2026
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powerup-2026/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260504T160000
DTEND;TZID=America/Chicago:20260504T170000
DTSTAMP:20260430T105931
CREATED:20260422T142523Z
LAST-MODIFIED:20260422T143428Z
UID:12361-1777910400-1777914000@www.common.org
SUMMARY:N2i Getting Started: The IBM i Interview That Works for Everyone in the Room
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/n2i-getting-started-the/
LOCATION:Zoom
ATTACH;FMTTYPE=image/png:https://www.common.org/wp-content/uploads/2024/02/N2i-2025.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260506T110000
DTEND;TZID=America/Chicago:20260506T120000
DTSTAMP:20260430T105931
CREATED:20260403T021103Z
LAST-MODIFIED:20260403T173700Z
UID:12252-1778065200-1778068800@www.common.org
SUMMARY:POWERcast: Build an IBM i Firewall Using Exit Point Management
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/powercast-build-an-ibm-i-firewall-using-exit-point-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260603
DTSTAMP:20260430T105931
CREATED:20260127T210646Z
LAST-MODIFIED:20260320T133635Z
UID:11870-1780358400-1780444799@www.common.org
SUMMARY:COMMON LATAM
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-latam/
END:VEVENT
END:VCALENDAR