Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Protect Your Business This Year with a BDR
Your Technology May Fail, but You Can Still Succee...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 13 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Email Malware Hosted Solutions Hackers IT Services Internet Productivity Managed IT Services Network Security Outsourced IT Data Software IT Support Data Backup Business Mobile Devices Tech Term Productivity Innovation Computer Microsoft Ransomware Backup Data Recovery Hardware Managed Service Provider Internet of Things Business Continuity Smartphone Google Cloud Computing Small Business Remote Monitoring Social Media Disaster Recovery Windows 10 Data Management Android Browser Efficiency User Tips Encryption Communication Artificial Intelligence Smartphones Managed IT Upgrade VoIP BYOD IT Support Windows Paperless Office Facebook Collaboration Save Money Mobile Device Mobile Device Management Cybersecurity Risk Management Workplace Tips Phishing Business Management App Saving Money Wi-Fi Server Bandwidth Robot BDR Firewall Applications Gmail Windows 10 Government Recovery Unified Threat Management Network Antivirus Wireless Project Management Chrome Password Infrastructure Vulnerability Hosted Solution Website Compliance Telephone Systems Apps SaaS Passwords Healthcare Office 365 Content Filtering Money Bring Your Own Device Data storage IT Management Holiday Managed IT Services Going Green Tip of the week Big Data Virtualization Vendor Management Document Management Politics Managed Service Information Work/Life Balance Employer-Employee Relationship Unified Communications Help Desk Blockchain Customer Service Customer Relationship Management Analytics Remote Computing Data loss Virtual Reality Data Security Training Miscellaneous Apple Regulations File Sharing Office IT Service Computing Computers Files Router Storage Two-factor Authentication communications Automation Operating System Printing Digital Payment Users IoT Mouse Flexibility VPN Outlook Chromebook Patch Management Spam Internet Exlporer Avoiding Downtime Websites Identity Theft Licensing WiFi Google Drive YouTube HIPAA Settings Virtual Private Network Downtime Business Growth Upgrades Mobile Security Network Management Twitter Administration Assessment Business Technology Server Management Education How To LiFi Mobile Computing Hacker Social Machine Learning Mobility Uninterrupted Power Supply IT solutions End of Support Health Tablet Wireless Technology Legal Monitors Microsoft Office Alert Word Sports The Internet of Things Electronic Medical Records Remote Monitoring and Management Redundancy Smart Technology Remote Workers Budget Maintenance Information Technology How To Samsung Tech Support Quick Tips Scam Microsoft Excel Hard Drive Modem Features Dark Data Personal Information Firefox Multi-Factor Security Wearable Technology Permission Safety Heating/Cooling IT Consulting Distributed Denial of Service Annual Convention Point of Sale Printer Alerts Geography Authorization Fleet Tracking Notifications WannaCry Mobile Favorites Windows 8 Save Time Time Management Networking Comparison Identity Sync Hacking Cache Cookies Electronic Health Records Identities Telephony Google Calendar Test Black Market Public Cloud Servers Data Breach Managed IT Service Star Wars San Diego Monitoring Law Enforcement Access Control Cooperation High-Speed Internet Employees Writing Emoji Specifications Asset Tracking Google Wallet Travel Company Culture Conferencing Network Congestion Botnet Disaster Mobile Device Managment Trending Software Tips Permissions Recycling Nanotechnology Cyberattacks Hard Drives Google Docs Computer Repair Legislation IT Technicians MSP RMM Automobile Computer Care Technology Laws Break Fix Utility Computing Social Networking Consulting Physical Security Gadget Mail Merge SharePoint Staff Development Zero-Day Threat Retail Humor Cortana Virtual Desktop Black Friday Roanoke — Central Technology Solutions OneNote Drones 3D Printing VoIP Sponsor Unified Threat Management Hotspot Managing Stress Instant Messaging Display Backups Touchscreen Techology Processors Fraud eWaste Screen Reader Read Only Solid State Drive Consultation GPS Lenovo Mirgation Proactive Tech Terms Deep Learning Statistics Dark Web Motherboard Managed Services Provider Office Tips Address Downloads Augmented Reality Cables Backup and Disaster Recovery Current Events Supercomputer Disaster Resistance Cyber Monday technology services provider Employee-Employer Relationship Alt Codes Unsupported Software Virus Crowdsourcing Digital Meetings Obstacle User Error Language Enterprise Content Management Finance Update G Suite Search History Management Smart Tech Cryptocurrency Tracking Superfish Software as a Service Migration Bluetooth Google Maps Marketing Data Warehousing Cost Management E-Commerce Taxes Operations Wires Human Error Social Engineering USB Private Cloud IT Budget Gadgets Proactive IT Connectivity Technology Assurance Group ’s 18 Typing Mobile Data Spyware Course Buisness Computing Infrastructure Vulnerabilities Authentication Hacks Best Practice Shortcut Cabling Net Neutrality Enterprise Resource Planning Bookmarks Bitcoin Technology Tips Chatbots WPA3 IT Consultant Error Procurement Cybercrime Emergency Regulation CrashOverride Web Server Cameras Motion Sickness Administrator CCTV Relocation Printers Theft Webcam Hard Disk Drive Financial