Best in Class. Better Than the Competition.
Clear, reliable communication and thorough documentation are integrated in all our projects. Our support and training sets us apart from our competition… every time.
Microsoft Azure, Amazon AWS & More
Elegant and well-executed applications are only half the battle. Hosting is critical to a successful solution. We offer customized hosting solutions and work hand-in-hand with the leading hosting and cloud providers.
We Speak Tech
Specializing in ASP.NET Core, Xamarin, DNN, & Kentico
Featured Case Studies
The path to success
With 10,000 pages of content across fifty portals that had built up over years in their “home-grown” website and database solution, Ducks Unlimited needed a solution to update their site. The challenge was to make it modern, responsive, social, secure, and put it in the cloud – all with zero downtime.
"Mitch and his group were highly recommended..and he kept up-to-date, with a deep knowledge of the DNN platform, tips, and tactics."See Case Study
With more than 3,000 products/documents hidden from their target audience in their "home-grown" solution, Mule-Hide needed a solid solution to manage & display their products, documents, and assets to the public. The challenge was to deliver a model solution, with accessibility & performance in mind, deployed to the cloud - all with zero downtime.
"[They] worked really well with every department at Mule-Hide and with our corporate office to achieve enthusiastic buy-in by delivering on their needs while providing direct answers, options, costs, and benefits."See Case Study
ICG's work with MetaFarms has been the result of 8+ years of collaboration, with ICG providing the training, tools, and guidance necessary for the MetaFarms team to evolve with the constantly changing technology landscape. A true example of the power of process & collaboration.
"IowaComputerGurus has delivered custom education, training, and services directly to our development staff — delivering high quality service, insight, and dedication to our needs. We’ve saved hundreds of development hours and improved the quality of our applications."See Case Study
With an amazing opportunity to grow an active user base from a few hundred to almost 100,000 concurrent users the Budget Challenge team was experiencing extreme growing pains. With the partnership of ICG, BudgetChallenge, and their hosting provider (PointClick) the seemily impossible was accomplished and goals were met, in record time.
"PointClick and IowaComputerGurus were knowledgeable, flexible and extremely responsive on an around-the-clock basis."See Case Study
Most Recent Blogs
.NET 5.0 Preview Release 8 is LIVE. Not only is Microsoft following an aggressive development schedule for .NET 5.0, but they are achieving their objective — hitting all of the projected milestones with marginal delays. The preview releases that we have been monitoring are demonstrating solid work and attention to detail. Here is what you need to know in the run-up to the most important advancement in code since ... well, since the invention of .NET.
There are recent July 4th updates to the Chrome browser can affect just about every website on the internet — Chrome 84. We are tracking these to ensure that our customers are well-prepared for updates and adapted to the changes as they occur. Here’s what you need to know.
Featured White Papers
More than 97% of websites have at least one unaddressed vulnerability. But not all vulnerabilities are created equal. So it can be difficult to decide when remedial action to take and – importantly — when to take it. In this timely white paper, we suggest a series of Best Practices to apply when you are informed that your website or application might be exposed using the Website Vulnerability and Exploit Response model (WVER) – applicable to all software platform and technology environments.
Website security continues to be a moving target as technology evolves and malicious attacks continue to evolve with it. While the website security best practices provided in this document are not all-inclusive, they form the core of what we consider to be relatively easy to implement set of website security policies that protect against most common attacks. Taking these few simple steps beyond just adding an SSL Certificate could be the difference that prevents an attack.