Technology Blogs

12|18|18

The Health and Tech Trends That Will Shape Pharma Marketing in 2019

It’s that time again … trend forecasting for 2019! Intouch’s annual trends report – this is our fourth – highlights the healthcare and tech trends that will shape the year ahead. In this POV, we’re focusing on the following 7 trends to keep an eye on: Healthcare reform and pricing pressures Understanding the human inside […]

06|19|17

WWDC 2017 – Apple Takes AR, VR and Machine Learning to New Heights

EXECUTIVE SUMMARY Apple isn’t always first to the party, but it generally makes a grand entrance when it arrives; this year’s annual Worldwide Developer Conference (WWDC) was no exception. Thousands gathered recently in San Jose, California, just outside Apple’s headquarters in Cupertino, to hear about its latest software and hardware advances. Among other things, Apple […]

06|06|17

Mary Meeker’s 2017 Internet Trends Report: 5 Key Healthcare Takeaways

EXECUTIVE SUMMARY Venture capitalist and digital guru Mary Meeker, of Kleiner Perkins Caufield and Byers, presented her highly anticipated annual Internet Trends Report — which TechCrunch has called the “state of the union for the technology industry” — at the 2017 Code Conference on May 31. The annual report culls research and insights on all […]

02|14|17

Innovation During Disruption and Change

EXECUTIVE SUMMARYWe live in times of disruption and change. Technology is disruptive: digital and mobile technologies, in particular, continue to significantly change how we communicate and how we do business. Medicine and science are disruptive by nature, testing the boundaries of knowledge to expand the possibilities for humankind. The political environment is disruptive – the […]

01|12|17

CES 2017 Digital Health Roundup

EXECUTIVE SUMMARYThe Consumer Electronics Show (CES) is largely considered the mecca of new consumer technology. Billed as “the world’s meeting place,” it represents the hope for the future when it comes to how consumers will interact with technology and, by extension, brands. In addition to the smarthome appliances, autonomous vehicles and plethora of robots making […]

10|19|16

iOS 10 Updates: How Do They Affect Email?

EXECUTIVE SUMMARY In September, Apple released iOS 10, its operating system update for iPhone, iPad and iPod touch. This update changes the way users interact with email on their native mail app. In addition to allowing users to delete the native mail app entirely, iOS 10 new features now include a block-images option; the removal […]

08|09|16

FDA Takes a Hands-Off Approach With Health Apps and Wearables

In a follow-up to its January 2015 draft guidance, the U.S. Food and Drug Administration’s (FDA) Center for Devices and Radiological Health recently released final guidance for low-risk general wellness products, including apps and wearables. Intouch Solutions reviewed the new final guidance and has determined that, though some language has changed (see section on terminology, […]

04|07|16

Daring Greatly and Telling Stories: From Presidents to Faith in Doubt

EXECUTIVE SUMMARY The South by Southwest (SXSW) Interactive Festival, held annually in Austin, Texas, brings in attendees from all over the world, and this year — their twenty-third — was no different. Along with 30,000+ others, Intouch Solutions was there to learn from and share with the biggest and brightest minds in technology, science and […]

10|07|15

The Potential Impact of Apple IOS 9’s Ad Blockers

EXECUTIVE SUMMARY Apple released its iOS 9 update for mobile devices on September 16, 2015. For the first time, Apple included a feature that gives users the ability to download apps that work within Apple’s browser, Safari, to block any and all digital ads on the mobile web. Blocked ads can include any banner, video […]

01|08|15

The WordPress Bug: What You Need to Know

WHAT THE WORDPRESS BUG MEANS FOR YOU AND HOW TO PROTECT YOUR SITES EXECUTIVE SUMMARYA bug has been discovered that could affect up to 90 percent of WordPress websites and blogs, specifically those running versions 3.9.2 and earlier. The bug is very easily exploited; an attacker just has to enter malicious code into an open […]

Load More Posts