BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260603
DTSTAMP:20260430T081053
CREATED:20260127T210646Z
LAST-MODIFIED:20260320T133635Z
UID:11870-1780358400-1780444799@www.common.org
SUMMARY:COMMON LATAM
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers				\n				\n				\n				\n									Speaker: Brian Nordland When: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.2. Understand the basics of creating more secure software on IBM i. 								\n				\n				\n				\n									\n					\n						\n									Register
URL:https://www.common.org/event/common-latam/
END:VEVENT
END:VCALENDAR