Loading…
WELCOME TO COMMON EUROPE CONGRESS 2025

Don’t forget to reach out to your local country user group to get the discount code for the congress!

Common Europe, in collaboration with Common Sweden, is delighted to be holding its annual flagship event, Common Europe Congress, in the friendly city of Gothenburg offering extensive education, networking and relaxation opportunities. It’s also a great opportunity for exploring the city… so why not take a family mini-break as well.
Congress education areas targeted are IBM Power hardware, Application Development, Advanced RPG, Open Source tools and Languages, System Management, Db2 and SQL,  IBM Storage, IBM i services and microservices, Security and Compliance and much more.
There will be two AIX / Linux tracks, to emphasize the Power Systems character of Common Europe.
Top IBM Business Architects and industry experts have already agreed to share their knowledge on the latest announcements, customer cases as well as practical subjects.
The congress content includes:
  1. 3 ½ days of latest education delivered by top IBM and industry leading speakers  punctuated by large breaks offering maximum networking,
  2. Three-hour in-depth workshops, 60 minutes’ education sessions and solution provider’s special slots,
  3. A Solution Providers’ Centre open for 2 ½ days with top European and worldwide technology companies at their booths presenting innovative practical solutions that will enhance our solutions,
  4. A  Congress Dinner  in the hotel with live entertainment.
We have negotiated special room rates in the Congress hotel itself, 
The Common Europe Organization Team looks forward to seeing you in picturesque Gothenburg.
Venue: 03 - F1 clear filter
Tuesday, June 3
 

10:40 CEST

Mission: Possible! Journaling Forensics 101 (with Free Tools)!
Tuesday June 3, 2025 10:40 - 11:40 CEST
Learn to think like a spy! Many shops use journaling for a variety of reasons, but may not be familiar with how to use these journals for forensic purposes. Mining your journals for the who, what, when, where, how - and sometimes even why - can be very useful, not to mention fun! Come join us for a lighthearted and entertaining "Mission: Impossible" themed look at one of the most useful things you can do with your journals. This session will introduce journaling concepts and share tuning tips to optimize your journal environment for forensics. After reviewing the "old fashioned" way to dig into your journals, we will demonstrate how much easier this is with the right tools. The DMPJRN and CVTJRNDTA commands used in this presentation will be made available as a free download to all attendees, including source code!

Learning Objectives - After participating in this session, attendees should have the skills and tools to:
- Optimize your journal environment to maximize the forensic information available to you
- Understand what your journals are trying to tell you, and how to interrogate them to get the answers you need
- Dump your journals quickly and easily using the free software made available
- Be able to interpret the content of your journals to determine what really happened to your data
- Use the techniques demonstrated in the provided source code to develop your own tools
- Save the world from evil-doers

Audience:
- Anyone who would like to better understand how to maximize their journaling environment to make use of forensic data would benefit from this session. If you've ever needed to figure out how something happened to your data, if you like playing detective, if you enjoy building tools to make your job easier, then please join us!
Speakers
avatar for Steve Wolk

Steve Wolk

CTO, PC Richard & Son
Steven Wolk is the Chief Technology Officer for PC Richard & Son, a family owned and operated chain of 66 appliance and electronics superstores located throughout NY, NJ, CT, and PA. Founded in 1909, PC Richard has always been known for honesty, integrity, and reliability throughout... Read More →
Tuesday June 3, 2025 10:40 - 11:40 CEST
03 - F1

11:50 CEST

IBM i - A Strategic Preview for 2025 and Beyond
Tuesday June 3, 2025 11:50 - 12:50 CEST
With the extreme pace at which technology is changing, it's nice to have a platform that is built for change. In this session, Steve Will, IBM i CTO & Chief Architect, will talk about the current technology drivers in the industry, and how the IBM i strategy and roadmap are adapting. Come hear about the new things in 2025, and the direction of the platform in the future.
Speakers
avatar for Steve Will

Steve Will

IBM i CTO & Chief Architect, IBM
Steve is the CTO and Chief Architect for the IBM i Operating System. Spending the past fourteen years of his IBM career in this position, he has become an award-winning speaker, author of the influential blog "You and i," (https://bit.ly/You-and-i-blog) and is one of the most sought-after voices at customer briefings and events. Steve has worked on IBM i and its predecessors since before the creation of the AS/400, and is currently responsible for setting the strategy of the IBM i operating system, as well as deciding which enhancements will be implemented. In his role, he talks to clients and pa... Read More →
Tuesday June 3, 2025 11:50 - 12:50 CEST
03 - F1

14:00 CEST

Inject more security into Db2 for i
Tuesday June 3, 2025 14:00 - 15:00 CEST
In this updated session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!
Speakers
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
Tuesday June 3, 2025 14:00 - 15:00 CEST
03 - F1

15:15 CEST

Sponsor session: Future-Proofing Your Data: Transitioning from Legacy Data Middleware to Advanced APIs and Seamless Data Replication
Tuesday June 3, 2025 15:15 - 15:40 CEST
Your IBMi platform is the strategic platform of choice for your organisation, however older methods of moving data such as ETL processes and FTP are an early 2000 answer to a 2025 problem. More and more organisations want to duplicate their legacy data alongside their distributed systems data for analytical, AI and ML cloud-based initiatives having a more secure, robust and automated way of achieving this. Join this session to learn about:
 
  1. One off bulk data load : Replicate your IBMi data by automating to cloud based services with no coding required.
  2. Utilise Change Data Capture (CDC)  : IBMi data changes automatically synchronised, staged and loaded into cloud-based services.
  3. Encapsulate RPG and Cobol Business Logic: Both screen and non-screen based programs can be converted into modern advanced APIs to then load business logic centric data into cloud based services.  No more having to duplicate business logic into stored procedures.
 
All with the latest security and standards which are at the top of your agenda.
 
The session will complete with a demo showing :
  1. The bulk loading of IBMi DB2 tables into a cloud-based database.
  2. Encapsulating business logic from an IBMi RPG program and loading that business logic enriched data into a cloud-based database.
  3. Transactional Data Changes (CDC)  loading into a cloud-based database.
Sponsor speakers
avatar for Andrew Simpson

Andrew Simpson

Solutions Architect, Rocket Software
Andrew has worked in the computer software industry for over 30 years starting off as a programmer to development manager, moving to technical consulting and then to a pre-sales engineering role. Andrew is currently a Solutions Architect at Rocket Software after being with Rocket... Read More →
Sponsors
Tuesday June 3, 2025 15:15 - 15:40 CEST
03 - F1

15:50 CEST

IBM i Security Best Practices
Tuesday June 3, 2025 15:50 - 16:50 CEST
The IBM i platform is widely known to be one of the most securable in the industry. However, it does still require that you configure it correctly to make it really secure. With the increasing cybersecurity threat level from Ransomware among other things, it is more important than ever to protect your IBM i.
In this session will cover IBM i Security Best Practices, including the most common and critical security configuration mistakes and how to remediate them.
Speakers
avatar for Janus Hertz

Janus Hertz

Consulting IT Specialist, IBM
IBM Technology Expert Labs Consultant - IBM Power / IBM i - Security, HA/DR, Virtualization - IBM Northern Europe
Tuesday June 3, 2025 15:50 - 16:50 CEST
03 - F1

17:00 CEST

SQL Services for Systems Management
Tuesday June 3, 2025 17:00 - 18:00 CEST
SQL Services on IBM i is a hot topic because there are so many ways that SQL Services can bring unique value and ease of use to anyone using an IBM i. Attend this session to understand which SQL Services have proven to be some of the most powerful and popular with IBM i users, with a specific focus on systems management.

The session will also include many working examples, to help you get started today!

https://www.ibm.com/support/pages/node/1119123
https://www.ibm.com/support/pages/ibm-i-tutorials-demos-and-sql-examples-0
https://learn.common.org/products/ibm-isee-video-blog
Speakers
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
Tuesday June 3, 2025 17:00 - 18:00 CEST
03 - F1
 
Wednesday, June 4
 

08:00 CEST

What you need to know to Upgrade IBM i to 7.6
Wednesday June 4, 2025 08:00 - 09:00 CEST
When doing an upgrade to IBM i, there is more work involved in the planning of the upgrade than in the actual upgrade itself. When you have done the planning, the actual upgrade is simple. We will cover planning tips, pre-requisites, the upgrade, and then post-installation requirements. Your upgrade isn’t complete until this last step is done.
Speakers
avatar for Pete Massiello

Pete Massiello

IBM i Advisor, Massiello Holding Corp.
Pete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. He is the President of iTech Solutions Group, an IBM Premier Business Partner delivering... Read More →
Wednesday June 4, 2025 08:00 - 09:00 CEST
03 - F1

10:20 CEST

Cool thinkgs in Navigator to be a Rockstar IBM i System Administrator
Wednesday June 4, 2025 10:20 - 11:20 CEST
IBM Navigator for i is a powerful tool to manage your i environment better. Get expert advice for installation and setup to make sure you get this powerful tool up and running at peak efficiency. Step through the functionality of this product and learn how to leverage the Performance Data Investigator to turn the collection services data into graphs you can use to identify performance issues. Learn ways to protect your system from intrusions and close security holes such as FTP. See how this tool can help you select and install Logical files on your system to improve performance. Learn about the enhancements to this valuable tool in the latest release while we see how this tool provides tips and techniques for better and more easily managing your IBM i.
Updated 2025
Speakers
avatar for Pete Massiello

Pete Massiello

IBM i Advisor, Massiello Holding Corp.
Pete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. He is the President of iTech Solutions Group, an IBM Premier Business Partner delivering... Read More →
Wednesday June 4, 2025 10:20 - 11:20 CEST
03 - F1

11:30 CEST

Ransomware and i
Wednesday June 4, 2025 11:30 - 12:30 CEST
Ransomware is one of the biggest threats to businesses today, but with the right tools, you can effectively protect your data.
Join our session, where we will showcase a live ransomware attack on IBM i and demonstrate how the latest IBM FlashSystem solutions with Insights Pro identify and stop attacks in real time.
Discover how Safeguarded Copy secures your data with immutable snapshots and get practical tips on how to best protect your IBM i environment.

Sign up now and be prepared to tackle one of today’s biggest threats—ransomware!
Speakers
avatar for Jesper Skov Johansen

Jesper Skov Johansen

IBM Certified Systems Expert & IBM Champion, Molgaard Data A/S
Wednesday June 4, 2025 11:30 - 12:30 CEST
03 - F1

12:40 CEST

SPS
Wednesday June 4, 2025 12:40 - 13:05 CEST
Wednesday June 4, 2025 12:40 - 13:05 CEST
03 - F1

14:05 CEST

IBM i Security: A Dual Responsibility
Wednesday June 4, 2025 14:05 - 15:05 CEST
With security breaches making weekly headlines, what is IBM doing to provide us with a secure-able operating system? From initial design through final tests, what part does security play? And once delivered to the IBM i community, what are our responsibilities? Or is what IBM's doing sufficient such that we have no additional work or responsibilities? Come and join a lively discussion between Steve Will and Carol Woodbury as they debate these relevant issues including the features delivered in the latest release.
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
avatar for Steve Will

Steve Will

IBM i CTO & Chief Architect, IBM
Steve is the CTO and Chief Architect for the IBM i Operating System. Spending the past fourteen years of his IBM career in this position, he has become an award-winning speaker, author of the influential blog "You and i," (https://bit.ly/You-and-i-blog) and is one of the most sought-after voices at customer briefings and events. Steve has worked on IBM i and its predecessors since before the creation of the AS/400, and is currently responsible for setting the strategy of the IBM i operating system, as well as deciding which enhancements will be implemented. In his role, he talks to clients and pa... Read More →
Wednesday June 4, 2025 14:05 - 15:05 CEST
03 - F1

15:20 CEST

Learn all about the SQL system manager approach
Wednesday June 4, 2025 15:20 - 16:20 CEST
In today's world a modern system manager no longer can limit him or herself to using 5250 emulation only. The SQL service have been on the menu for quite a while now. Dive into what can be done the SQL way, resulting in less errors and getting the work done faster. Leaving yoy more time to dive into enhancing your SQL, because once you get started using SQL I promise you, you can not stop.
Speakers
avatar for Rudi van Helvoirt

Rudi van Helvoirt

Technical Director, Easi
After having started as a System/38 programmer in 1986. In 1989 the switch was made to system programming and systems management.Being passionate about systems management he founded van Helvoirt Automatisering in 1993.Rudi enjoys helping IBM i customers ever since for running their... Read More →
Wednesday June 4, 2025 15:20 - 16:20 CEST
03 - F1

16:30 CEST

IBM i Security with an SQL Chaser
Wednesday June 4, 2025 16:30 - 17:30 CEST
In this award-winning session, be prepared to hear Scott Forstie and Carol Woodbury shake up the world of IBM i Security, mixing up new SQL features that allow you to completely do away with the old way you've been investigating and managing your IBM i Security environment. They will also shake up your mind with thoughts of finding vulnerabilities in your code and debate various methods of resolving the issues. Come prepared to have your IBM i Security world a bit shaken.  
Speakers
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
Wednesday June 4, 2025 16:30 - 17:30 CEST
03 - F1
 
Thursday, June 5
 

09:10 CEST

IBM i Backup and Restore Tactics with BRMS
Thursday June 5, 2025 09:10 - 10:10 CEST
Lots of clients are still using native save when saving their system with limited knowledge of BRMS. In this session there will be in depth knowledge of BRMS including prerequisites, installation and get start with it first time. The new web interface has been released and can be configured.Creating control groups for different type of saves will also be covered. Different system can share inventory via BRMS network. Defining BRMS policies and the affect on the operations will be demonstrated .Full system recovery reports generation and media inventory in BRMS Some Restore examples using BRMS for library and IFS. Learn about new BRMS product(5770BR2) with GUI
Speakers
avatar for Rohit Chauhan

Rohit Chauhan

Senior Technical Specialist and IBM Champion, Tietoevry Tech Services Norway AS
Rohit Chauhan is an IBM Champion and a Senior Technical Specialist with expertise in IBM i platform and IBM Power Systems. He is also a IBM Redbooks author and works at Tietoevry Tech Services, Stavanger, Norway, which is an IBM Business Partner and one of the biggest IT service providers... Read More →
Thursday June 5, 2025 09:10 - 10:10 CEST
03 - F1

10:20 CEST

IBM i Security Enhancements - What's new
Thursday June 5, 2025 10:20 - 11:20 CEST
Attacks of different kinds have unfortunately also affected IBM i systems of companies of all sizes.
Therefore, it is important to leverage native IBM i security features to protect your business application environment. IBM i 7.5 has introduced many new security functions that can be used to lower the risk of successful hacking or intrusion attempts. New functions and enhancement are also introduced in almost every new Technology Refresh (TR).
Join this session to get an extensive overview of the latest security enhancements.
Speakers
avatar for Janus Hertz

Janus Hertz

Consulting IT Specialist, IBM
IBM Technology Expert Labs Consultant - IBM Power / IBM i - Security, HA/DR, Virtualization - IBM Northern Europe
Thursday June 5, 2025 10:20 - 11:20 CEST
03 - F1
 
COMMON EUROPE CONGRESS 2025
From €204.79
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.