Best in Class. Better Than the Competition.
Clear, reliable communication and thorough documentation are integrated in all our projects. Our support and training sets us apart from our competition… every time.
Microsoft Azure, Amazon AWS & More
Elegant and well-executed applications are only half the battle. Hosting is critical to a successful solution. We offer customized hosting solutions and work hand-in-hand with the leading hosting and cloud providers.
We Speak Tech
Specializing in ASP.NET Core, Xamarin, DNN, & Kentico
Featured Case Studies
The path to success
With 10,000 pages of content across fifty portals that had built up over years in their “home-grown” website and database solution, Ducks Unlimited needed a solution to update their site. The challenge was to make it modern, responsive, social, secure, and put it in the cloud – all with zero downtime.
"Mitch and his group were highly recommended..and he kept up-to-date, with a deep knowledge of the DNN platform, tips, and tactics."See Case Study
With more than 3,000 products/documents hidden from their target audience in their "home-grown" solution, Mule-Hide needed a solid solution to manage & display their products, documents, and assets to the public. The challenge was to deliver a model solution, with accessibility & performance in mind, deployed to the cloud - all with zero downtime.
"[They] worked really well with every department at Mule-Hide and with our corporate office to achieve enthusiastic buy-in by delivering on their needs while providing direct answers, options, costs, and benefits."See Case Study
ICG's work with MetaFarms has been the result of 8+ years of collaboration, with ICG providing the training, tools, and guidance necessary for the MetaFarms team to evolve with the constantly changing technology landscape. A true example of the power of process & collaboration.
"IowaComputerGurus has delivered custom education, training, and services directly to our development staff — delivering high quality service, insight, and dedication to our needs. We’ve saved hundreds of development hours and improved the quality of our applications."See Case Study
With an amazing opportunity to grow an active user base from a few hundred to almost 100,000 concurrent users the Budget Challenge team was experiencing extreme growing pains. With the partnership of ICG, BudgetChallenge, and their hosting provider (PointClick) the seemily impossible was accomplished and goals were met, in record time.
"PointClick and IowaComputerGurus were knowledgeable, flexible and extremely responsive on an around-the-clock basis."See Case Study
Most Recent Blogs
The Internet Has Become Complacent Again, and That’s Got to Stop. Even though the relentless march of technology has dramatically improved the stability and reliability of networks and hardware, business and enterprise websites and systems face continued threats from cascading failure in hyperscale public clouds to malware and ransomware. We have updated and revised our Best Practice recommendations for keeping your data safe in the age of the cloud and — more importantly — providing a clear path to recovery when the worst happens.
We have been around datacenters for our entire careers. For decades the trend has been toward bigger and more powerful data centers that contain literally millions of processors. These behemoths are placed where power is cheap and bandwidth easily available. And they are so expensive that you just can't put them all the places you need to. But what if there was a way to put small, super-powerful computing power anywhere in the world without having to worry about power or connectivity? The future is now.
Featured White Papers
More than 97% of websites have at least one unaddressed vulnerability. But not all vulnerabilities are created equal. So it can be difficult to decide when remedial action to take and – importantly — when to take it. In this timely white paper, we suggest a series of Best Practices to apply when you are informed that your website or application might be exposed using the Website Vulnerability and Exploit Response model (WVER) – applicable to all software platform and technology environments.
Website security continues to be a moving target as technology evolves and malicious attacks continue to evolve with it. While the website security best practices provided in this document are not all-inclusive, they form the core of what we consider to be relatively easy to implement set of website security policies that protect against most common attacks. Taking these few simple steps beyond just adding an SSL Certificate could be the difference that prevents an attack.