iPhone 5 Compatibility

Share this article
Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestEmail this to someone
We have done a preliminary check of our applications on the iPhone 5 simulator and it looks like everything works fine on our applications, including SplashID, SplashMoney and SplashShopper.Like other legacy applications, our user interfaces currently run in a frame the size of the iPhone 4S – 640 x 960 pixels – centered on the screen. This looks fine, but we are already working to enhance our interfaces to take full advantage of the new screen size.

Once the updates are available, you’ll be able to have a little more room to work with lists in our applications which will be a welcome change we’re sure.

iPhone 5 Compatibility

3 thoughts on “iPhone 5 Compatibility

  • September 14, 2012 at 9:56 am
    Permalink

    Good post. I hope that the iPhone 5 keeps running good. I heard its camera is not good and so is ts LTE 4G coverage.

    Hope for the best.

    Regards

    .A-

    Reply
  • September 21, 2012 at 10:56 am
    Permalink

    Thanks for the review, I've been wondering how old apps will look like and feel like when running on iPhone 5.

    Reply
  • February 13, 2016 at 7:09 pm
    Permalink

    Thanks for the article. We all need to be more prvcotiae about our personal account security. The fact that we are still living in a password ruled world is frustrating. Almost everything is still only password protected. But ultimately the fact is passwords (strong or not) do not replace the need for other effective security control. The only real solution is to add additional layers of authentication for access and transaction verification without unreasonable complexity and this will of help to their customers if they implement some form of a two-step or two-factor authentication were you can telesign into your account and have the security knowing you are protected if your password were to be stolen. This should be a prerequisite to any system that wants to promote itself as being secure. With this if they were to try to use the “stolen” password and don’t have your phone nor are on the computer, smartphone or tablet you have designated trusted, they would not be able to enter the account.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *