Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Protect Your Business This Year with a BDR
Your Technology May Fail, but You Can Still Succee...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Outsourced IT Productivity Data Software Managed IT Services IT Support Data Backup Business Mobile Devices Innovation Computer Ransomware Tech Term Hardware Microsoft Data Recovery Backup Small Business Google Cloud Computing Internet of Things Managed Service Provider Business Continuity Smartphone Efficiency Social Media Remote Monitoring Disaster Recovery Windows 10 Paperless Office Smartphones Data Management User Tips Android Upgrade Artificial Intelligence Managed IT IT Support Communication Business Management Browser Encryption VoIP Phishing BYOD Windows Save Money Facebook Collaboration Risk Management Mobile Device Management Workplace Tips Cybersecurity Windows 10 App Holiday Mobile Device Robot Employer-Employee Relationship Saving Money Applications Bandwidth Server BDR Firewall Apps Passwords Gmail Recovery Office 365 Bring Your Own Device communications Managed IT Services Government Wi-Fi Network Unified Threat Management Vendor Management Document Management Compliance Password Healthcare Telephone Systems Infrastructure SaaS Hosted Solution Website Vulnerability Content Filtering Information Automation Virtualization Money Data storage IT Management Going Green Tip of the week Big Data Scam Antivirus Wireless Chrome Project Management Work/Life Balance Miscellaneous Customer Relationship Management Analytics Remote Computing Regulations Data loss Office IT Service Data Security Training Two-factor Authentication Microsoft Office Apple Router Computers Managed Service Storage Social File Sharing Tablet Computing Files Blockchain Help Desk Customer Service Quick Tips Unified Communications Politics Virtual Reality Printing Spam Digital Payment Twitter Mouse VPN Outlook YouTube Patch Management WiFi Websites Identity Theft Downtime Licensing Google Drive Settings Remote Monitoring and Management End of Support Health Virtual Private Network Management Business Growth Administration Network Management Software as a Service LiFi Remote Workers The Internet of Things Education Monitors Assessment Business Technology Alert Server Management Electronic Medical Records How To Mobile Computing Hacker Smart Technology Maintenance IT solutions Machine Learning Mobility Uninterrupted Power Supply IoT How To Samsung Wireless Technology Legal Sports Employees Flexibility Word Internet Exlporer Chromebook HIPAA Avoiding Downtime Redundancy Company Culture Budget Access Control Private Cloud Information Technology Mobile Security Tech Support Upgrades Operating System Users Heating/Cooling IT Consulting Proactive Tech Terms Break Fix Remote Worker Social Networking Point of Sale Computer Repair eWaste Read Only SharePoint Staff Cables Backup and Disaster Recovery Black Friday Roanoke — Central Technology Solutions Physical Security WannaCry Windows 8 Save Time Managed Services Provider Unified Threat Management Hotspot Retail Cortana Time Management Networking Finance Mirgation Sync 3D Printing Hacking Identities Employee-Employer Relationship Fraud Wasting Time Screen Reader Telephony Display Enterprise Content Management Augmented Reality Public Cloud Processors Servers Data Breach Theft Dark Web ROI Motherboard Law Enforcement Downloads Google Wallet Wires Human Error Cyber Monday technology services provider Office Tips Travel Cost Management E-Commerce User Error Language Botnet Vulnerabilities Authentication Migration Mobile Device Managment Unsupported Software Software Tips Virus Disaster Trending Hard Drives Google Docs Connectivity Smart Tech Update Operations Automobile Computer Care Technology Laws WPA3 Financial Data Warehousing Notes Virtual Desktop Gadget Mail Merge Humor Enterprise Resource Planning Bookmarks Touchscreen Techology Drones Permission Technology Assurance Group ’s 18 VoIP Sponsor Backups Hard Drive Features Computing Infrastructure Social Engineering USB Geography Authorization Technology Tips Chatbots Mobile Data Solid State Drive Net Neutrality GPS Consultation Lenovo Deep Learning Multi-Factor Security Wearable Technology Statistics Fleet Tracking Procurement Microsoft Excel PowerPoint Modem Address Current Events Mobile Favorites Disaster Resistance Alt Codes Test Distributed Denial of Service Annual Convention Crowdsourcing Dark Data Meetings Personal Information Digital Obstacle Cache Electronic Health Records Printer Alerts Safety Supercomputer High-Speed Internet Comparison Identity G Suite History Search Cryptocurrency Star Wars Monitoring Marketing Tracking Superfish Google Calendar Buisness Google Maps Notifications Bluetooth Asset Tracking Gadgets Professional Services Cookies Taxes Conferencing IT Budget Black Market Proactive IT Typing MSP RMM Managed IT Service Security Cameras San Diego Spyware Course Hacks Recycling Cyberattacks Cooperation Best Practice Development Zero-Day Threat Specifications Cabling Shortcut Bitcoin Utility Computing Consulting Writing Emoji Legislation IT Technicians OneNote Permissions Virtual Assistant Nanotechnology Network Congestion Firefox Managing Stress Instant Messaging Error Cybercrime Emergency Web Server CrashOverride Printers Cameras Motion Sickness Administrator CCTV Regulation Relocation Webcam Hard Disk Drive IT Consultant