BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.15//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Common
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20240310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20241103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251016T110000
DTEND;TZID=America/Chicago:20251016T120000
DTSTAMP:20260403T173657
CREATED:20250924T195934Z
LAST-MODIFIED:20251015T115919Z
UID:10839-1760612400-1760616000@www.common.org
SUMMARY:POWERcast: Using IBM i Self-Service Password Reset to Reduce Costs\, Improve Security
DESCRIPTION:Presenters: Rick Hengst Price: Free Courtesy of SEADate/Time: October 16\, 2025 @ 11:00 AM CT \nUsing IBM i Self-Service Password Reset to Reduce Costs\, Improve Security \nSEA’s IBM i experts demonstrate how to solve common IBM i password management issues by implementing IBM i Self-Service Password Reset (SSPR).  \nWe’ll explore how IBM i SSPR solutions can increase security\, reduce costs\, improve productivity\, avoid risks\, and meet compliance requirements by:• Avoiding IBM i password phishing attacks and other cybersecurity risks• Significantly reducing IBM i support costs• Helping meet MFA and other compliance requirements • Demonstrating features and best practices for deploying SSPR on IBM i systems \nJoin SEA on October 16th\, 11am CT to discover how to increase user productivity\, efficiency\, and security by using SSPR for IBM i \n  \n \nRick Hengst is an information systems professional with over 30 years of experience in design\, development\, implementation\, and support of various applications across a wide spectrum of industries. At SEA\, Rick specializes in support of the IBM i platform and the iSecurity suite of products.  \n					\n									Register
URL:https://www.common.org/event/powercast-using-ibm-i-self-service-password-reset-to-reduce-costs-improve-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251029T110000
DTEND;TZID=America/Chicago:20251029T120000
DTSTAMP:20260403T173657
CREATED:20251013T183538Z
LAST-MODIFIED:20251017T221433Z
UID:11010-1761735600-1761739200@www.common.org
SUMMARY:POWERcast : Security & Quality Without Compromise—See What’s Next for IBM i
DESCRIPTION:Presenters: Chris White\, Herman Rensink\, & Andy FinleyPrice: Free Courtesy of Rocket SoftwareDate/Time: October 29\, 2025 @ 11:00 AM CT \nSecurity & Quality Without Compromise—See What’s Next for IBM i \nJoin us for a powerful and forward-looking webinar hosted by Rocket Software in partnership with COMMON\, where we’ll explore two of the most critical priorities in modern IBM i development: security and quality. \nYou’ll hear directly from Rocket Software experts: Chris White\, Herman Rensink\, & Andy Finley. \nTogether\, they’ll share practical strategies and insights to help you: \n\nImplement shift-left practices that catch issues earlier and reduce risk\nStrengthen security around database access\, compliance\, and control\nApply efficient testing approaches that preserve performance and user trust\n\nPlus\, you’ll get an exclusive first look at the November release of Rocket® DevOps Insights (RDOi)—designed to help developers\, testers\, and IT leaders stay ahead of evolving challenges. \nJoin us for this insightful session and take the next step toward more secure\, resilient development practices. \n					\n									Register\n					 \n \nChris WhiteProduct Manager\, Rocket® DevOps \n \nAndy FinleySales Engineer \n \nHerman RensinkDistinguished Engineer
URL:https://www.common.org/event/powercast-security-quality-without-compromise-see-whats-next-for-ibm-i/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251103T170000
DTEND;TZID=America/Chicago:20251103T180000
DTSTAMP:20260403T173657
CREATED:20250728T152959Z
LAST-MODIFIED:20251006T110830Z
UID:10477-1762189200-1762192800@www.common.org
SUMMARY:N2i Getting Started With: How to Get Oriented on this Weird Platform
DESCRIPTION:N2i Getting Started With: How to Get Oriented on this Weird Platform\nSpeaker: Jack WoehrDate: November 3 \nJack will present on “Getting Started: How to get oriented on this weird platform”. IBM i and IBM mainframes continue over 60 years since their inception to represent a valid approach to business computing\, despite having often followed Yogi Berra’s proverbial advice\, “When you come to a fork in the road\, take it!” \nJack came from open source and personal computers to the IBM i environment and will share about the nature of and reasons for the differences between the IBM “big iron” approach environment and what we’re all used to from our personal computers and web servers. He’ll help you get oriented so the features of IBM i which are stumbling blocks to newcomers become instead stepping stones to a deeper understanding of enterprise computing in the world of big business. \n					\n									Register
URL:https://www.common.org/event/n2i-getting-started-with-how-to-get-oriented-on-this-weird-platform/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251119T110000
DTEND;TZID=America/Chicago:20251119T120000
DTSTAMP:20260403T173657
CREATED:20251106T220106Z
LAST-MODIFIED:20251119T181320Z
UID:11249-1763550000-1763553600@www.common.org
SUMMARY:POWERcast - IFS Security: Don’t Leave Your Server Vulnerable
DESCRIPTION:IFS Security: Don’t Leave Your Server Vulnerable\nSpeaker: Sandi MooreDate: November 19\, 11:00 AM CT \nExperts agree that one of the most overlooked areas of IBM i security is the Integrated File System (IFS). But it needs to be secure because the IFS provides access for users carrying nothing more than a user profile and password! \nIf you believe nothing important is stored on your server’s IFS\, think again\, because it’s a conduit to many things\, including the Operating System and all of your application libraries and files. \nJoin IBM Champion and security expert Sandi Moore to learn about securing the IFS\, including: \n\nWhy we care about the IFS\nPermissions versus Authority\nRoot folder access\nAuditing IFS activities\nRead/write versus *ALLOBJ\nAntivirus considerations\n\n					\n									Register\n					\n																														 \nFree Courtesy Of:\n															\n																														 \nAbout Sandi Moore \nSandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i\, AIX\, and Linux\, she has been involved in product demonstrations\, implementation\, support\, training\, research\, and product testing. Sandi is also a Certified Professional Forensics Analyst (CPFA)\,a Certified Data Privacy Practitioner (CDPP)\, and Secured Cloud Computing Practitioner (SCCP). \nIn her time at Fortra\, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems\, no matter how many servers are in their environment or where in the world they’re located.
URL:https://www.common.org/event/powercast-ifs-security-dont-leave-your-server-vulnerable/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251201T123000
DTEND;TZID=America/Chicago:20251201T133000
DTSTAMP:20260403T173657
CREATED:20251104T194331Z
LAST-MODIFIED:20251112T180417Z
UID:11221-1764592200-1764595800@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nHave a problem and need some expert advice? Want to meet more people on the i?  \nJoin COMMON for an hour of networking and problem solving! \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-5/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20251216T110000
DTEND;TZID=America/Chicago:20251216T120000
DTSTAMP:20260403T173657
CREATED:20251208T105151Z
LAST-MODIFIED:20251209T142147Z
UID:11476-1765882800-1765886400@www.common.org
SUMMARY:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security
DESCRIPTION:POWERcast: How to Avoid the Biggest Mistakes in IBM i Security\nDate: December 16 | 11 AM CTSpeaker: Sandi Moore\, Sr. Solutions Engineer\, Fortra \nIT professionals need to get cybersecurity right every single day\, while an attacker only has to succeed once to do incredible damage. Whether it’s thousands of exposed records\, millions of dollars in fines and legal fees\, or diminished share value\, it’s easy to judge organizations that fall victim. \nBut these attacks are also a chance to learn. What underlying vulnerabilities were overlooked\, and how can your organization avoid making similar missteps? \nJoin this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates\, including SOX\, PCI\, GDPR\, and HIPAA. IBM Champion and security expert Sandi Moore will cover: \n\nCommon misconceptions that put IBM i at risk\nThe unexpected source of many security breaches\nAction you can take that doesn’t require new tools\n\nIf you’re responsible for IBM i or IT security\, you don’t want to miss this session. \n																														 \nFree Courtesy Of\n															\n					\n									Register
URL:https://www.common.org/event/powercast-how-to-avoid-the-biggest-mistakes-in-ibm-i-security/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260112T140000
DTEND;TZID=America/Chicago:20260112T150000
DTSTAMP:20260403T173657
CREATED:20250814T193140Z
LAST-MODIFIED:20260107T184943Z
UID:10541-1768226400-1768230000@www.common.org
SUMMARY:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers
DESCRIPTION:N2i: Fortify and Conquer: Secure Coding Strategies for IBM i Developers\nSpeaker: Brian Nordland \nWhen: January 12\, 2:00 p.m. – 3:00 p.m. CT \nEmbark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development! \nIn this session tailored for ILE developers (including RPG and CL developers)\, we’ll dissect real-world examples of security pitfalls in our sample software\, exploring issues like object authority\, adopted authority\, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild. \nLearning Objectives:\n1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.\n2. Understand the basics of creating more secure software on IBM i. \n Register
URL:https://www.common.org/event/n2i-fortify-and-conquer-secure-coding-strategies-for-ibm-i-developers/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260202
DTEND;VALUE=DATE:20260204
DTSTAMP:20260403T173657
CREATED:20260112T210121Z
LAST-MODIFIED:20260112T210121Z
UID:11755-1769990400-1770163199@www.common.org
SUMMARY:COMMON India
DESCRIPTION:
URL:https://www.common.org/event/common-india-2/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260202T123000
DTEND;TZID=America/Chicago:20260202T133000
DTSTAMP:20260403T173657
CREATED:20260112T203231Z
LAST-MODIFIED:20260112T205423Z
UID:11737-1770035400-1770039000@www.common.org
SUMMARY:N2i Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nDate: February 2nd \nTime: 12:30PM – 1:30PM (CST) \nJoin us for a hour of networking with fellow n2i-ers and our experts. Come with questions and solve problems.  \n					\n									Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-6/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260217
DTEND;VALUE=DATE:20260219
DTSTAMP:20260403T173657
CREATED:20260107T142252Z
LAST-MODIFIED:20260107T143259Z
UID:11663-1771286400-1771459199@www.common.org
SUMMARY:Focus 2026
DESCRIPTION:
URL:https://www.common.org/event/focus-2026/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260309T120000
DTEND;TZID=America/Chicago:20260309T130000
DTSTAMP:20260403T173657
CREATED:20260302T160413Z
LAST-MODIFIED:20260309T153333Z
UID:12102-1773057600-1773061200@www.common.org
SUMMARY:N2i: AI with IBM i Overview
DESCRIPTION:N2i: Ai with IBM i  Overview\n					\n									Register\n					 \nDate: March 9Time: 12:00 CTSpeaker: Jesse Gorzinski \nIn a world where artificial intelligence is becoming more and more prominent\, how will your business adapt and thrive? Your journey can start here\, with an exploration of IBM’s strategy and offering set. In this session\, we will explore the available AI technologies and what they mean for IBM i. You’ll see an overview of what AI stacks are available from IBM and strategic partners\, as well as an exploration of exciting ways to integrate AI with existing RPG and Db2 applications
URL:https://www.common.org/event/n2i-ai-with-ibm-i-overview/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260310T080000
DTEND;TZID=America/Chicago:20260310T170000
DTSTAMP:20260403T173657
CREATED:20260209T163235Z
LAST-MODIFIED:20260209T163235Z
UID:11964-1773129600-1773162000@www.common.org
SUMMARY:COMMON at WMPCA
DESCRIPTION:
URL:https://www.common.org/event/common-at-wmpca/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260319T110000
DTEND;TZID=America/Chicago:20260319T120000
DTSTAMP:20260403T173657
CREATED:20260226T160155Z
LAST-MODIFIED:20260306T133755Z
UID:12061-1773918000-1773921600@www.common.org
SUMMARY:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps
DESCRIPTION:POWERcast: Working Together on IBM i: Git + Change Management for Innovative IBM i DevOps\n\nDate: March 19Time: 11:00 AM – 12:00 PM (CST) \nSource versioning tools like Git have transformed modern development—but for IBM i teams\, Git alone isn’t enough. When paired with structured change management\, it becomes a powerful combination that streamlines source control\, strengthens compliance\, and improves collaboration across IT teams. \nJoin Donna Westmoreland and fellow IBM i innovators as they share real-world experiences integrating Git with IBM i change management. Discover how organizations are embracing DevOps practices while maintaining the control\, auditability\, and reliability IBM i environments demand. \nIn this session\, you’ll learn how combining Git with change management enables: \n\nFaster\, more efficient Git interactions with IBM i\nClear traceability and audit readiness\nSeamless synchronization between development and production\nImproved team collaboration without sacrificing governance\n\n  \nIf you’re looking to modernize your IBM i development process without compromising stability or compliance\, this session will show you how to achieve the best of both worlds: agile\, collaborative development with safe\, controlled deployments. \n					\n									Register\n					\n																														 \nDonna Westmoreland \nCTO\, Midrange Dynamics North America \nDonna is the CTO for Midrange Dynamics North America and has over 25 years of experience with IBM midrange systems and supporting consistent software change methodologies. Experience gained from leading major projects\, including application modernization\, at hundreds of corporations has given her a well-rounded view of development needs\, audit requirements\, and testing principles. 
URL:https://www.common.org/event/powercast-working-together-on-ibm-i-git-change-management-for-innovative-ibm-i-devops/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260406T123000
DTEND;TZID=America/Chicago:20260406T133000
DTSTAMP:20260403T173657
CREATED:20260224T172154Z
LAST-MODIFIED:20260325T171949Z
UID:12024-1775478600-1775482200@www.common.org
SUMMARY:N2i: Lunch Hour and Networking
DESCRIPTION:N2i Lunch Hour and Networking\nDate: April 6\nTime: 12:30 – 1:30 PM (CT) \nGrab your lunch and your laptop for a quick 1 hour networking session. Come with questions and get to know your peers.  \n Register
URL:https://www.common.org/event/n2i-lunch-hour-and-networking-7/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260403T173657
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:NEUGC 2026 \nDate: April 7 – 9\, 2026 \nLeominster\, MA \nGot IBM i Skills Gaps? \nThe IBM i skills shortage is the number one concern for IBM i organizations\, according to the 2026 Fortra IBM i Marketplace Report. This marks the first time skills have overtaken cybersecurity as the industry’s top worry—highlighting the challenge for companies struggling to find qualified IBM i talent. \nFor more than 30 years\, NEUGC has been dedicated to solving this problem. Every year\, we bring together the community for 2.5 days of deep technical content\, hands-on learning\, vendor insights\, and valuable networking. Countless friendships have been forged\, teams strengthened\, and organizations empowered to achieve remarkable results. \nFor a $700 investment per attendee\, your team will learn directly from some of the most respected IBM i experts in the world\, including: \n• Tim Rowe (IBM) \n• Birgitta Hauser \n• Simon Hutchinson \n• Jack Woehr \nRegister by March 17th to take advantage of extra savings. Be sure to select the tickets marked Early Bird. \n Register   View Sessions
URL:https://www.common.org/event/neugc/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260427
DTEND;VALUE=DATE:20260501
DTSTAMP:20260403T173657
CREATED:20250914T170030Z
LAST-MODIFIED:20250915T173913Z
UID:10745-1777248000-1777593599@www.common.org
SUMMARY:POWERUp 2026
DESCRIPTION:Come see us in beautiful New Orleans\, April 27 – 30. \nMore information coming soon.
URL:https://www.common.org/event/powerup-2026/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260506T110000
DTEND;TZID=America/Chicago:20260506T120000
DTSTAMP:20260403T173657
CREATED:20260403T021103Z
LAST-MODIFIED:20260403T173700Z
UID:12252-1778065200-1778068800@www.common.org
SUMMARY:POWERcast: Build an IBM i Firewall Using Exit Point Management
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management\nDate: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. \n					\n									Register\n					 \nFree Courtesty of\n															\n															\n															\n		Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-build-an-ibm-i-firewall-using-exit-point-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260603
DTSTAMP:20260403T173657
CREATED:20260127T210646Z
LAST-MODIFIED:20260320T133635Z
UID:11870-1780358400-1780444799@www.common.org
SUMMARY:COMMON LATAM
DESCRIPTION:
URL:https://www.common.org/event/common-latam/
END:VEVENT
END:VCALENDAR