What's in the name?
Our name really isn't "IDEOLOGY." Just think "I.T." instead of "Oh Gee."
We modernized our name in 2009, coining 'IDEOLITY,' a mashup of 'ideals' and 'IT' to reflect our world view.
But the original remains our corporate name (partly because we have not exhausted our supply of pre-printed checks and deposit slips). So, if you search business records, look for 'Twenty-First Century Communications Corporation.' Founded way back in 1988. There were originally four partners, but our current CEO bought the others out in 1991.
In 1998, we became a Microsoft Certified Partner and have remained a partner in good standing continuously since then.
In 2004, we purchased and renovated a building to be our headquarters in Merriam, KS. Eleven years later, we agreed to sell the building so the next door neighbor, a no-kill animal shelter, could expand, and we moved into our current space in Mission, KS.
In 2005, we began working with clients in other states beyond Kansas and Missouri.
In 2006, we founded ReValence Networks, Ltd. and co-located in the data center at 1102 Grand Ave. (one of the area's largest data centers). ReValence works hand-in-hand with IDEOLITY to provide cloud and other Internet-based services including hosting, co-location and virtual servers.
In 2008, we became an authorized Google reseller.
In 2015, we completed our intergenerational management transition, adding a chief technical officer.
In 2018, we added a project management professional to our full time team of IT professionals, which includes two with IT masters degrees, two military veterans and six with a variety of industry certifications.
IDEOLITY has been continuously recognized on the list of the Kansas City Business Journal's top 25 Computer Networking Companies for the last fifteen years.
Our technology stack:
IDEOLITY uses a number of software tools, equivalent to two full-time employees, that help us provide a full suite of managed technology services to our clients. These tools provide antivirus, update and patch management, inventory, remote access and other capabilities. Importantly, all of these systems employ multi-factor authentication and layered security to reduce our exposure to attack.