Glossary entry

French term or phrase:

application fictive

English translation:

dummy application

Added to glossary by Brandie Brunner
Jun 27, 2013 16:55
10 yrs ago
1 viewer *
French term

application fictive

French to English Tech/Engineering Computers: Systems, Networks
The document is a set of specifications describing updates that need to be made to this IT application, which is described as "application fictive":

"Ce document a pour objectif de décrire l’ajout optionnel de l’application fictive XX dans la fiche d’habilitation de l’utilisateur"
"L’application fictive infocentre XX permet de gérer les accès aux guichets sensibles et aux données sensibles des infocentres "

I have had no luck finding other occurrences of this phrase in Google and research into potential uses of "fictif" in an IT context seems to vary widely: placeholder, formal, fictitious, dummy.

Discussion

Brandie Brunner (asker) Jun 28, 2013:
Thank you to Sangro and Terry for the explanations. My mind was starting to grasp this, but you made it much clearer for me. Thanks also to Phil for putting "dummy" out there for discussion from the start. Will :grade" you when my 24 hours are up!
Terry Richards Jun 28, 2013:
Definitely dummy It looks to me that security access here is being managed at the application level. For example, for application A you can access files 1, 2 & 3, for application B, you can access files 1, 2, 4 & 5. The problem is then, how do you give users access to certain files when you do not want to give them access to any of the applications? Well, you give them access to the dummy application XX (which either does nothing or doesn't even exist at all) and this grants them access to the files that XX is permitted to access. There's probably further instructions of how to allocate the file permissions to XX (and, therefore, to users who are approved to use XX).
Joshua Pepper Jun 27, 2013:
Maybe a 'mirror' or 'clone' application, in that it provides a virtual counter-part to each user that the Infocentre can interact with behind the scenes.
Brandie Brunner (asker) Jun 27, 2013:
Here is another sentence that helps a bit more:
"La règle de gestion actuelle, un utilisateur ayant une fiche d’habilitation YY a une et une seule application fictive XX, ce qui a pour conséquence de donner potentiellement accès aux Infocentres à tous les utilisateurs même si ces derniers n’ont pas d’Infocentre dans leur fiche d’habilitation"
The XX "application fictive" grants permission to access the Infocentre and exists for each and every user, even if the user is not meant to have access to the Infocentre. Does "dummy" convey this idea of a file that is created automatically and individually for all users? I'm not even sure that "fictif" conveys that idea!
Joshua Pepper Jun 27, 2013:
I agree with phil, 'dummy' could work. Maybe 'virtual' might be another possibility though?
philgoddard Jun 27, 2013:
"Dummy" sounds good to me for the first one - it doesn't actually exist, and it's just there for some kind of testing or demonstration purposes. But if it's a nonexistent application, how can it manage access to "guichets sensibles"(whatever they are)? Maybe that's its ostensible purpose, a dummy access management application.

Proposed translations

+2
12 hrs
Selected

dummy application

Based on your text: La règle de gestion actuelle, un utilisateur ayant une fiche d’habilitation YY a une et une seule application fictive XX, ce qui a pour conséquence de donner potentiellement accès aux Infocentres à tous les utilisateurs même si ces derniers n’ont pas d’Infocentre dans leur fiche d’habilitation"


Example of dummy application in a similar context:
"Applications comprising programs and data structures are updated to include a dummy application that can replace the ordinarily executable application and that manipulates the data structure when invoked, so as to limit it.....

The dummy application is subsequently reduced to have a limited amount of the original functionality and to prompt the user to delete it.

This is especially helpful when temporary permission is needed because etc.... So if a user needs to use the application, then the permission log may allow unauthenticated access for some period of time or a limited number of times before a connection must be made to renew permissions. "

Google Patents - http://is.gd/dy1Bee
Peer comment(s):

agree Terry Richards : Right answer but your examples don't really fit. See my discussion entry.
33 mins
Thanks, Terry! You're right. It's definitely a permission workaround - which is what I was looking for, although I did not find the same context.
agree GILLES MEUNIER
7 hrs
Thanks!
Something went wrong...
3 KudoZ points awarded for this answer. Comment: "Thanks again to Sangro and to Terry for the good links!"
22 mins

sample application

In this particular context, the text is describing interaction between various components. I believe that "fictive" is used merely to highlight that XX is not a real application, only an example for the purpose of understanding.

"Build a Sample GWT Application"
https://developers.google.com/web-toolkit/doc/latest/tutoria...

"Sample Applications. Ready-to-use sample applications are bundled with the NetBeans IDE."
https://netbeans.org/kb/samples/
Something went wrong...
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search