BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.15//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250529T110000
DTEND;TZID=America/Chicago:20250529T120000
DTSTAMP:20260403T155840
CREATED:20250422T231515Z
LAST-MODIFIED:20250513T150428Z
UID:9793-1748516400-1748520000@www.common.org
SUMMARY:POWERcast: IBM i Ransomware/Malware Detection and Prevention
DESCRIPTION:Presenters: Ken McCalister and Rick Hengst Price: Free Courtesy of SEADate/Time: May 29th\, 2025 @ 11:00 AM CT \nHow Secure Is Your IBM i Against Ransomware & Malware? \nFailure to quickly detect and respond to IBM i cyberattacks can result in data loss\, reputational damage\, lost revenue\, and other serious consequences. \nJoin SEA on May 29th to learn how to protect your IBM i systems from these growing threats.We’ll share practical strategies and tactics to strengthen your defenses and enhance your response to ransomware and malware attacks including: \n• Identifying vulnerabilities in IBM i systems• Stopping cyberattacks before they reach IBM i servers• Developing effective ransomware and malware prevention strategies• Enabling IBM i protection to detect\, alert\, block\, and report cyberattacks• Recovering from ransomware and malware incidents \nDon’t miss this opportunity to discover how to improve your cybersecurity and protect your IBM i systems from ransomware and malware. \n  \n \nKen McCalister has spent 35 years working with IBM i technology. Ken has vast experience working in all aspects of digital technology and management\, including Administration\, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft\, providing support to its many diverse clients \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products. \n					\n									Register Today
URL:https://www.common.org/event/ibm-i-ransomware-malware-detection-and-prevention/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250602T170000
DTEND;TZID=America/Chicago:20250602T180000
DTSTAMP:20260403T155840
CREATED:20250318T171859Z
LAST-MODIFIED:20250513T142953Z
UID:9638-1748883600-1748887200@www.common.org
SUMMARY:N2i Getting Started With: Leveraging SQL Services
DESCRIPTION:With every Tech Refresh and OS upgrade\, IBM provides new and updated SQL Services.  These are tools for the developer\, administrator\, and engineer which combine the power of existing APIs with the ease-of-use of SQL.  Whether you’re an expert SQL developer\, or you traditionally use the “greenscreen” for your dev/admin activities\, these IBM i Services can greatly improve your efficiency.  Learn how to use these tools individually and in combination to unlock their full potential!  Bring your questions and any challenges that you’re facing. \nSpeaker: Steve Riedmueller \nBio: Steve has been working on the IBM i platform since 2001. He has developed an expertise in system security\, performance\, communications\, and various IBM and 3rd-party software packages. Steve holds a B.S. from Rutgers University. In recent years Steve has become a COMMON and WMCPA speaker\, an N2i mentor\, and the N2i committee lead. In the world of IBM i technology\, Steve is passionate about process improvement. He enjoys leveraging IBM i SQL Services for administration/operations tasks such as security and performance\, as well as automation. \n  \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250625T120000
DTEND;TZID=America/Chicago:20250625T130000
DTSTAMP:20260403T155840
CREATED:20250604T143333Z
LAST-MODIFIED:20250617T151958Z
UID:10007-1750852800-1750856400@www.common.org
SUMMARY:Cyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads
DESCRIPTION:Presenters: \nTony Fiorot\, IBM – Cloud Solution Sales Executive\, Power Systems Virtual Server\nRichard R. Spurlock\, Cobalt Iron – CEO and Founder\nMatt Dittoe\, Cobalt Iron – Vice President of Sales \nPrice: Free Courtesy of Cobalt Iron \nDate/Time: June 25th\, 2025 @ 12:00 PM CT \nCyber Resilient Backup Patterns for IBM Power VS and Hybrid Workloads \nAre backup challenges and security complexities leaving you frustrated or overwhelmed? If so\, you won’t want to miss this discussion! \nOur panel of experts will explore three customer use cases including specific challenges\, overview of solution patterns\, and the impacts of Compass Secure Automated Backup. \nCustomer Challenges Explored: \n\nChallenge #1 – Reduce risk moving on-premises Power workloads to the cloud\n\nChallenge #2 – Hybrid data protection\n\nChallenge #3 – Unify protection for Power and x86 workloads (VMware\, KVM\, etc.)\n\n  \n Register Today  \n \nTony Fiorot \nTony is a dynamic leader with a passion for guiding teams and customers through transformational change and the adoption of emerging technologies. With deep expertise in solution sales\, business transformation\, and Go-To-Market strategies\, Tony has helped organizations unlock the full potential of cloud services\, artificial intelligence\, and digital user experiences. He is highly skilled in security and privacy by design\, data protection\, enterprise content management\, workflow optimization\, strategic planning\, consulting\, and financial analysis. \nKnown for his ability to make complex technical topics accessible and engaging\, Tony combines technical mastery with an energetic\, approachable style that resonates with diverse audiences. Tony’s outstanding contributions have been recognized with the prestigious Best of IBM Award in 2018. \n  \n \nRichard R. Spurlock \nIntellectually curious entrepreneur\, Richard is recognized as a global expert on data protection and recovery. After spending 15 years designing and delivering the world’s largest data protection applications\, Richard harnessed that expertise to build a disruptive\, software-defined data protection solution: Compass. Compass is the industry’s first enterprise-class data protection and analytics software designed to natively run in hybrid and public cloud environments. An experienced speaker and subject matter expert\, Richard is a frequent industry spokesman and an avid Formula 1 racing fan with his family. \n  \n \nMatt Dittoe  \nA former developer\, architect\, and systems engineer\, Matt has deep infrastructure knowledge and experience that he brings to solution sales and customer engagement.  He has held a series of leadership positions at Amazon Web Services\, Oracle\, SolarWinds\, Hewlett Packard\, and at Cobalt Iron\, where he currently serves as Vice President of Sales.
URL:https://www.common.org/event/cyber-resilient-backup-patterns-for-ibm-power-vs-and-hybrid-workloads/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250707T123000
DTEND;TZID=America/Chicago:20250707T133000
DTSTAMP:20260403T155840
CREATED:20250318T171733Z
LAST-MODIFIED:20250609T144634Z
UID:9636-1751891400-1751895000@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:Come network with your peers during your lunch hour! \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-3/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250908T170000
DTEND;TZID=America/Chicago:20250908T180000
DTSTAMP:20260403T155840
CREATED:20250701T190014Z
LAST-MODIFIED:20250717T201437Z
UID:10256-1757350800-1757354400@www.common.org
SUMMARY:N2i: Forget ODBC! Here's a New Db2 Connector
DESCRIPTION:N2i: Forget ODBC! Here’s a New Db2 Connector \nSpeaker: Jonathan ZakWhen: September 8\, 5:00 p.m. – 6:00 p.m. CT \nConnecting to Db2 has never been easier or more efficient. Join us for an in-depth session on Mapepire\, a powerful open-source library designed to simplify and enhance your Db2 database interactions. This library offers a more straightforward alternative to traditional JDBC or ODBC connections\, ensuring developers can achieve optimal performance and scalability without the usual complexity.  \n					\n									Register
URL:https://www.common.org/event/n2i-db2connector/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250910T110000
DTEND;TZID=America/Chicago:20250910T120000
DTSTAMP:20260403T155840
CREATED:20250822T184105Z
LAST-MODIFIED:20250822T184715Z
UID:10628-1757502000-1757505600@www.common.org
SUMMARY:POWERcast: Sizing Power11 Correctly with Performance Navigator
DESCRIPTION:Presenters: Chuck Losinski and Randy WatsonPrice: Free Courtesy of FortraDate/Time: September 10th\, 2025 @ 11:00 AM CT \nSizing Power11 Correctly with Performance Navigator  \nIBM Power11 technology is here for running IBM i\, AIX\, and Linux workloads.  Performance Navigator is ready to help you plan your move to your next Power Server\, whether it’s on-premises\, dynamic capacity on-premises (PEP2)\, or in the cloud. \nPerformance Navigator is the only tool that can predict the exact model\, processor\, memory\, storage\, PowerVM settings\, and VIOS needs for IBM Power 9\, Power 10\, and now Power 11.  Join Fortra Power server experts Randy Watson and Chuck Losinski as they discuss: \n\nWhat’s new with Power 11 and how it affects capacity planning\nWhat is available for Power11 planning\nWhat you need to provide Fortra for a detailed Capacity Plan\nHow this service is used by most IBM resellers around the globe\n\nYou will learn the steps for proper capacity planning in a live demonstration and how this will save you in the future! \n  \n \nChuck Losinski\, Director of Technical Solutions for the Robot product line\, has been with Fortra for over 25 years. He has over 40 years of experience in IT\, including 30+ years on the IBM i platform. \nChuck’s background covers a wide variety of technical responsibilities\, involving system implementation\, programming\, operations\, training and support. Chuck has helped numerous customers automate their IBM i business applications\, processes\, and monitoring. Also\, he is on the advisory board of the IBM i user group\, QUSER. \n  \n \nRandy Watson is a capacity and performance analysis expert and offers consulting services around the Performance Navigator software. Before teaming up with Fortra\, Randy was President and Co-Founder of Midrange Performance Group\, Inc. (MPG) before Fortra acquired the company in August 2018. \nHe has been working in the IT industry for nearly 50 years\, focusing primarily on performance and capacity planning. The last two decades have been spent helping IBM\, IBM business partners\, and customers manage and analyze performance and capacity on the Power Systems platform for IBM i\, AIX\, VIOS\, and Linux\, having most recently added analyzing AI/ML Power environments by monitory GPU metrics. Randy graduated from Eastern New Mexico University with a Bachelor of Business Administration in 1972. \n					\n									Register Today
URL:https://www.common.org/event/powercast-sizing-power11-correctly-with-performance-navigator/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250915T080000
DTEND;TZID=America/Chicago:20250917T123000
DTSTAMP:20260403T155840
CREATED:20250106T162744Z
LAST-MODIFIED:20250827T140842Z
UID:9202-1757923200-1758112200@www.common.org
SUMMARY:NAViGATE 2025
DESCRIPTION:PAGE IN PROGRESS\nNAViGATE 2025 \nWhere: Pittsburgh Pennsylvania \nWhen: September 15 – 17  \nMore Details coming soon!
URL:https://www.common.org/event/navigate-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20250924T110000
DTEND;TZID=America/Chicago:20250924T120000
DTSTAMP:20260403T155840
CREATED:20250905T130340Z
LAST-MODIFIED:20250918T150510Z
UID:10682-1758711600-1758715200@www.common.org
SUMMARY:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data
DESCRIPTION:POWERcast: Beyond the Hype: How AI Agents Can Unlock the Value of IBMi Data\nDate: September 24\, 2025Time: 11:00 AM – 12:00 PM (CT)Speaker: Nikhil Sama \nAI is everywhere\, but how does it actually apply to IBMi? In this session\, we’ll cut through the buzzwords to show you how AI agents can “speak IBMi” and transform your decades of business-critical data into modern analytics. \nWhat You’ll Learn: \n– Why unlocking IBMi data is critical for competitive advantage and operational efficiency \n– How agentic AI can decode the semantic structure of IBMi data: from cryptic table names and journals to business meaning \n– Practical techniques for building AI agents that understand IBMi’s unique data language \n– How to orchestrate modern data pipelines into platforms like Snowflake\, Databricks\, Tableau and Thoughtspot \n– Smart automation strategies for translating from IBMi’s native structures to contemporary analytics frameworks \nYour IBMi data speaks a unique language packed with decades of business logic\, journals\, and custom code. Now AI agents can finally understand it. Join us to discover how to harness this understanding to automate pipelines\, accelerate reporting\, and deliver a practical roadmap with real examples that unlock immediate business value from your IBMi infrastructure. \n					\n									Register\n					\n																														 \nNikhil is the Founder and CTO of Turgon AI\, a Silicon Valley startup building an agentic platform to help companies modernize their data infrastructure\, accelerate data migration / integrations and generate revenue and operational insights. He’s a serial entrepreneur\, with a proven track record of building AI + Expert Human based services to unlock business value. 
URL:https://www.common.org/event/powercast-turgon-ai/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251006
DTEND;VALUE=DATE:20251010
DTSTAMP:20260403T155840
CREATED:20250617T174210Z
LAST-MODIFIED:20250617T174210Z
UID:10130-1759708800-1760054399@www.common.org
SUMMARY:IBM TechXChange 2025
DESCRIPTION:
URL:https://www.common.org/event/ibm-techxchange-2025/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251013T123000
DTEND;TZID=America/Chicago:20251013T133000
DTSTAMP:20260403T155840
CREATED:20250911T191448Z
LAST-MODIFIED:20250911T191906Z
UID:10738-1760358600-1760362200@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nJoin the N2i community for an hour of learning and networking with your peers!  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-4/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T110000
DTEND;TZID=America/Chicago:20251016T120000
DTSTAMP:20260403T155840
CREATED:20250924T195934Z
LAST-MODIFIED:20251015T115919Z
UID:10839-1760612400-1760616000@www.common.org
SUMMARY:POWERcast: Using IBM i Self-Service Password Reset to Reduce Costs\, Improve Security
DESCRIPTION:Presenters: Rick Hengst Price: Free Courtesy of SEADate/Time: October 16\, 2025 @ 11:00 AM CT \nUsing IBM i Self-Service Password Reset to Reduce Costs\, Improve Security \nSEA’s IBM i experts demonstrate how to solve common IBM i password management issues by implementing IBM i Self-Service Password Reset (SSPR).  \nWe’ll explore how IBM i SSPR solutions can increase security\, reduce costs\, improve productivity\, avoid risks\, and meet compliance requirements by:• Avoiding IBM i password phishing attacks and other cybersecurity risks• Significantly reducing IBM i support costs• Helping meet MFA and other compliance requirements • Demonstrating features and best practices for deploying SSPR on IBM i systems \nJoin SEA on October 16th\, 11am CT to discover how to increase user productivity\, efficiency\, and security by using SSPR for IBM i \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products.  \n					\n									Register
URL:https://www.common.org/event/powercast-using-ibm-i-self-service-password-reset-to-reduce-costs-improve-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251029T110000
DTEND;TZID=America/Chicago:20251029T120000
DTSTAMP:20260403T155840
CREATED:20251013T183538Z
LAST-MODIFIED:20251017T221433Z
UID:11010-1761735600-1761739200@www.common.org
SUMMARY:POWERcast : Security & Quality Without Compromise—See What’s Next for IBM i
DESCRIPTION:Presenters: Chris White\, Herman Rensink\, & Andy FinleyPrice: Free Courtesy of Rocket SoftwareDate/Time: October 29\, 2025 @ 11:00 AM CT \nSecurity & Quality Without Compromise—See What’s Next for IBM i \nJoin us for a powerful and forward-looking webinar hosted by Rocket Software in partnership with COMMON\, where we’ll explore two of the most critical priorities in modern IBM i development: security and quality. \nYou’ll hear directly from Rocket Software experts: Chris White\, Herman Rensink\, & Andy Finley. \nTogether\, they’ll share practical strategies and insights to help you: \n\nImplement shift-left practices that catch issues earlier and reduce risk\nStrengthen security around database access\, compliance\, and control\nApply efficient testing approaches that preserve performance and user trust\n\nPlus\, you’ll get an exclusive first look at the November release of Rocket® DevOps Insights (RDOi)—designed to help developers\, testers\, and IT leaders stay ahead of evolving challenges. \nJoin us for this insightful session and take the next step toward more secure\, resilient development practices. \n					\n									Register\n					 \n \nChris WhiteProduct Manager\, Rocket® DevOps \n \nAndy FinleySales Engineer \n \nHerman RensinkDistinguished Engineer
URL:https://www.common.org/event/powercast-security-quality-without-compromise-see-whats-next-for-ibm-i/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251103T170000
DTEND;TZID=America/Chicago:20251103T180000
DTSTAMP:20260403T155840
CREATED:20250728T152959Z
LAST-MODIFIED:20251006T110830Z
UID:10477-1762189200-1762192800@www.common.org
SUMMARY:N2i Getting Started With: How to Get Oriented on this Weird Platform
DESCRIPTION:N2i Getting Started With: How to Get Oriented on this Weird Platform\nSpeaker: Jack WoehrDate: November 3 \nJack will present on “Getting Started: How to get oriented on this weird platform”. IBM i and IBM mainframes continue over 60 years since their inception to represent a valid approach to business computing\, despite having often followed Yogi Berra’s proverbial advice\, “When you come to a fork in the road\, take it!” \nJack came from open source and personal computers to the IBM i environment and will share about the nature of and reasons for the differences between the IBM “big iron” approach environment and what we’re all used to from our personal computers and web servers. He’ll help you get oriented so the features of IBM i which are stumbling blocks to newcomers become instead stepping stones to a deeper understanding of enterprise computing in the world of big business. \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-how-to-get-oriented-on-this-weird-platform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251119T110000
DTEND;TZID=America/Chicago:20251119T120000
DTSTAMP:20260403T155840
CREATED:20251106T220106Z
LAST-MODIFIED:20251119T181320Z
UID:11249-1763550000-1763553600@www.common.org
SUMMARY:POWERcast - IFS Security: Don’t Leave Your Server Vulnerable
DESCRIPTION:IFS Security: Don’t Leave Your Server Vulnerable\nSpeaker: Sandi MooreDate: November 19\, 11:00 AM CT \nExperts agree that one of the most overlooked areas of IBM i security is the Integrated File System (IFS). But it needs to be secure because the IFS provides access for users carrying nothing more than a user profile and password! \nIf you believe nothing important is stored on your server’s IFS\, think again\, because it’s a conduit to many things\, including the Operating System and all of your application libraries and files. \nJoin IBM Champion and security expert Sandi Moore to learn about securing the IFS\, including: \n\nWhy we care about the IFS\nPermissions versus Authority\nRoot folder access\nAuditing IFS activities\nRead/write versus *ALLOBJ\nAntivirus considerations\n\n					\n									Register\n					\n																														 \nFree Courtesy Of:\n															\n																														 \nAbout Sandi Moore \nSandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i\, AIX\, and Linux\, she has been involved in product demonstrations\, implementation\, support\, training\, research\, and product testing. Sandi is also a Certified Professional Forensics Analyst (CPFA)\,a Certified Data Privacy Practitioner (CDPP)\, and Secured Cloud Computing Practitioner (SCCP). \nIn her time at Fortra\, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems\, no matter how many servers are in their environment or where in the world they’re located.
URL:https://www.common.org/event/powercast-ifs-security-dont-leave-your-server-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251201T123000
DTEND;TZID=America/Chicago:20251201T133000
DTSTAMP:20260403T155840
CREATED:20251104T194331Z
LAST-MODIFIED:20251112T180417Z
UID:11221-1764592200-1764595800@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nHave a problem and need some expert advice? Want to meet more people on the i?  \nJoin COMMON for an hour of networking and problem solving! \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-5/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251216T110000
DTEND;TZID=America/Chicago:20251216T120000
DTSTAMP:20260403T155840
CREATED:20251208T105151Z
LAST-MODIFIED:20251209T142147Z
UID:11476-1765882800-1765886400@www.common.org
SUMMARY:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security
DESCRIPTION:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security\nDate: December 16 | 11 AM CTSpeaker: Sandi Moore\, Sr. Solutions Engineer\, Fortra \nIT professionals need to get cybersecurity right every single day\, while an attacker only has to succeed once to do incredible damage. Whether it’s thousands of exposed records\, millions of dollars in fines and legal fees\, or diminished share value\, it’s easy to judge organizations that fall victim. \nBut these attacks are also a chance to learn. What underlying vulnerabilities were overlooked\, and how can your organization avoid making similar missteps? \nJoin this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates\, including SOX\, PCI\, GDPR\, and HIPAA. IBM Champion and security expert Sandi Moore will cover: \n\nCommon misconceptions that put IBM i at risk\nThe unexpected source of many security breaches\nAction you can take that doesn’t require new tools\n\nIf you’re responsible for IBM i or IT security\, you don’t want to miss this session. \n																														 \nFree Courtesy Of\n															\n					\n									Register
URL:https://www.common.org/event/powercast-how-to-avoid-the-biggest-mistakes-in-ibm-i-security/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260112T140000
DTEND;TZID=America/Chicago:20260112T150000
DTSTAMP:20260403T155840
CREATED:20250814T193140Z
LAST-MODIFIED:20260107T184943Z
UID:10541-1768226400-1768230000@www.common.org
SUMMARY:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers\nSpeaker: Brian Nordland \nWhen: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:\n1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.\n2. Understand the basics of creating more secure software on IBM i. \n Register
URL:https://www.common.org/event/n2i-fortify-and-conquer-secure-coding-strategies-for-ibm-i-developers/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260202
DTEND;VALUE=DATE:20260204
DTSTAMP:20260403T155840
CREATED:20260112T210121Z
LAST-MODIFIED:20260112T210121Z
UID:11755-1769990400-1770163199@www.common.org
SUMMARY:COMMON India
DESCRIPTION:
URL:https://www.common.org/event/common-india-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260202T123000
DTEND;TZID=America/Chicago:20260202T133000
DTSTAMP:20260403T155840
CREATED:20260112T203231Z
LAST-MODIFIED:20260112T205423Z
UID:11737-1770035400-1770039000@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nDate: February 2nd \nTime: 12:30PM – 1:30PM (CST) \nJoin us for a hour of networking with fellow n2i-ers and our experts. Come with questions and solve problems.  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-6/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260217
DTEND;VALUE=DATE:20260219
DTSTAMP:20260403T155840
CREATED:20260107T142252Z
LAST-MODIFIED:20260107T143259Z
UID:11663-1771286400-1771459199@www.common.org
SUMMARY:Focus 2026
DESCRIPTION:
URL:https://www.common.org/event/focus-2026/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260309T120000
DTEND;TZID=America/Chicago:20260309T130000
DTSTAMP:20260403T155840
CREATED:20260302T160413Z
LAST-MODIFIED:20260309T153333Z
UID:12102-1773057600-1773061200@www.common.org
SUMMARY:N2i: AI with IBM i Overview
DESCRIPTION:N2i: Ai with IBM i  Overview\n					\n									Register\n					 \nDate: March 9Time: 12:00 CTSpeaker: Jesse Gorzinski \nIn a world where artificial intelligence is becoming more and more prominent\, how will your business adapt and thrive? Your journey can start here\, with an exploration of IBM’s strategy and offering set. In this session\, we will explore the available AI technologies and what they mean for IBM i. You’ll see an overview of what AI stacks are available from IBM and strategic partners\, as well as an exploration of exciting ways to integrate AI with existing RPG and Db2 applications
URL:https://www.common.org/event/n2i-ai-with-ibm-i-overview/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260310T080000
DTEND;TZID=America/Chicago:20260310T170000
DTSTAMP:20260403T155840
CREATED:20260209T163235Z
LAST-MODIFIED:20260209T163235Z
UID:11964-1773129600-1773162000@www.common.org
SUMMARY:COMMON at WMPCA
DESCRIPTION:
URL:https://www.common.org/event/common-at-wmpca/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T110000
DTEND;TZID=America/Chicago:20260319T120000
DTSTAMP:20260403T155840
CREATED:20260226T160155Z
LAST-MODIFIED:20260306T133755Z
UID:12061-1773918000-1773921600@www.common.org
SUMMARY:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps
DESCRIPTION:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps\n\nDate: March 19Time: 11:00 AM – 12:00 PM (CST) \nSource versioning tools like Git have transformed modern development—but for IBM i teams\, Git alone isn’t enough. When paired with structured change management\, it becomes a powerful combination that streamlines source control\, strengthens compliance\, and improves collaboration across IT teams. \nJoin Donna Westmoreland and fellow IBM i innovators as they share real-world experiences integrating Git with IBM i change management. Discover how organizations are embracing DevOps practices while maintaining the control\, auditability\, and reliability IBM i environments demand. \nIn this session\, you’ll learn how combining Git with change management enables: \n\nFaster\, more efficient Git interactions with IBM i\nClear traceability and audit readiness\nSeamless synchronization between development and production\nImproved team collaboration without sacrificing governance\n\n  \nIf you’re looking to modernize your IBM i development process without compromising stability or compliance\, this session will show you how to achieve the best of both worlds: agile\, collaborative development with safe\, controlled deployments. \n					\n									Register\n					\n																														 \nDonna Westmoreland \nCTO\, Midrange Dynamics North America \nDonna is the CTO for Midrange Dynamics North America and has over 25 years of experience with IBM midrange systems and supporting consistent software change methodologies. Experience gained from leading major projects\, including application modernization\, at hundreds of corporations has given her a well-rounded view of development needs\, audit requirements\, and testing principles. 
URL:https://www.common.org/event/powercast-working-together-on-ibm-i-git-change-management-for-innovative-ibm-i-devops/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260406T123000
DTEND;TZID=America/Chicago:20260406T133000
DTSTAMP:20260403T155840
CREATED:20260224T172154Z
LAST-MODIFIED:20260325T171949Z
UID:12024-1775478600-1775482200@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nDate: April 6\nTime: 12:30 – 1:30 PM (CT) \nGrab your lunch and your laptop for a quick 1 hour networking session. Come with questions and get to know your peers.  \n Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-7/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260403T155840
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:NEUGC 2026 \nDate: April 7 – 9\, 2026 \nLeominster\, MA \nGot IBM i Skills Gaps? \nThe IBM i skills shortage is the number one concern for IBM i organizations\, according to the 2026 Fortra IBM i Marketplace Report. This marks the first time skills have overtaken cybersecurity as the industry’s top worry—highlighting the challenge for companies struggling to find qualified IBM i talent. \nFor more than 30 years\, NEUGC has been dedicated to solving this problem. Every year\, we bring together the community for 2.5 days of deep technical content\, hands-on learning\, vendor insights\, and valuable networking. Countless friendships have been forged\, teams strengthened\, and organizations empowered to achieve remarkable results. \nFor a $700 investment per attendee\, your team will learn directly from some of the most respected IBM i experts in the world\, including: \n• Tim Rowe (IBM) \n• Birgitta Hauser \n• Simon Hutchinson \n• Jack Woehr \nRegister by March 17th to take advantage of extra savings. Be sure to select the tickets marked Early Bird. \n Register   View Sessions
URL:https://www.common.org/event/neugc/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260427
DTEND;VALUE=DATE:20260501
DTSTAMP:20260403T155840
CREATED:20250914T170030Z
LAST-MODIFIED:20250915T173913Z
UID:10745-1777248000-1777593599@www.common.org
SUMMARY:POWERUp 2026
DESCRIPTION:Come see us in beautiful New Orleans\, April 27 – 30. \nMore information coming soon.
URL:https://www.common.org/event/powerup-2026/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260506T110000
DTEND;TZID=America/Chicago:20260506T120000
DTSTAMP:20260403T155840
CREATED:20260403T021103Z
LAST-MODIFIED:20260403T173700Z
UID:12252-1778065200-1778068800@www.common.org
SUMMARY:POWERcast: Build an IBM i Firewall Using Exit Point Management
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management\nDate: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. \n					\n									Register\n					 \nFree Courtesty of\n															\n															\n															\n		Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-build-an-ibm-i-firewall-using-exit-point-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260603
DTSTAMP:20260403T155840
CREATED:20260127T210646Z
LAST-MODIFIED:20260320T133635Z
UID:11870-1780358400-1780444799@www.common.org
SUMMARY:COMMON LATAM
DESCRIPTION:
URL:https://www.common.org/event/common-latam/
END:VEVENT
END:VCALENDAR