Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Protect Your Business This Year with a BDR
Your Technology May Fail, but You Can Still Succee...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Productivity Network Security Data Productivity Outsourced IT Managed IT Services Data Backup Software IT Support Business Innovation Mobile Devices Data Recovery Tech Term Computer Hardware Microsoft Ransomware Google Backup Small Business Cloud Computing Business Continuity Internet of Things Efficiency IT Support Smartphone Managed Service Provider Upgrade Remote Monitoring Disaster Recovery User Tips Business Management Android Social Media Communication Windows 10 VoIP Data Management Phishing Smartphones Paperless Office Encryption Managed IT Artificial Intelligence Windows Workplace Tips Collaboration Browser Server Cybersecurity Risk Management Save Money BYOD Windows 10 Managed IT Services communications Facebook Mobile Device Management Saving Money Mobile Device Passwords Holiday App Automation Recovery Firewall Bandwidth BDR Wi-Fi Apps Applications Office 365 Robot Bring Your Own Device Compliance Gmail Government Vendor Management Unified Threat Management Employer-Employee Relationship Document Management Network Analytics Chrome Vulnerability Virtualization Business Technology Hosted Solution Website Money Healthcare IT Management Content Filtering Data storage Tip of the week Going Green SaaS Telephone Systems Quick Tips Scam Antivirus Project Management Wireless Managed Service Big Data Password Infrastructure Information Microsoft Office Data loss Settings Data Security Blockchain Training Apple Help Desk Social Customer Service File Sharing Virtual Reality Tablet Computing Files Miscellaneous Router Regulations Two-factor Authentication Printing Office IT Service VPN Politics Computers Work/Life Balance Customer Relationship Management Storage Unified Communications Remote Computing Internet Exlporer Spam Network Management Licensing HIPAA YouTube Business Growth How To Samsung WiFi Assessment Employees Downtime Server Management How To Company Culture Access Control Mobile Computing Chromebook Mobile Security Flexibility Avoiding Downtime Uninterrupted Power Supply Hacker Administration LiFi Education Machine Learning Mobility Proactive Wireless Technology Legal Word Upgrades IT solutions Twitter Redundancy Remote Monitoring and Management Management Software as a Service Budget The Internet of Things Sports End of Support Health Information Technology Remote Workers Private Cloud Smart Technology Tech Support Operating System Maintenance Monitors Patch Management Mouse Net Neutrality Networking Outlook Electronic Medical Records IoT Alert Digital Payment Users Websites Identity Theft Virtual Private Network Google Drive Test Comparison Identity Voice over Internet Protocol Telephony Cache Electronic Health Records Mobile Data Sync Google Calendar PowerPoint Law Enforcement Disaster Trending Google Wallet Star Wars Monitoring Cookies Public Cloud High-Speed Internet Dark Data Personal Information Travel Technology Laws Asset Tracking Managed IT Service San Diego Safety Botnet Mail Merge Hard Drives Google Docs Conferencing Cooperation Touchscreen Software Tips Techology Humor MSP RMM Specifications Windows 7 VoIP Sponsor Recycling Cyberattacks Mobile Device Managment Zero-Day Threat Legislation IT Technicians Professional Services Gadget Drones Utility Computing Consulting Permissions Nanotechnology Notifications Automobile Consultation Computer Care Lenovo Backups Development Security Cameras Statistics Deep Learning OneNote Break Fix Social Networking Black Market Address Solid State Drive Managing Stress Instant Messaging SharePoint Staff Disaster Resistance Current Events Tech Terms Black Friday Roanoke — Central Technology Solutions Transportation Writing Emoji Virtual Desktop Digital GPS Obstacle eWaste Read Only Unified Threat Management Hotspot Cables Backup and Disaster Recovery Mirgation Virtual Assistant Network Congestion Search Alt Codes Managed Services Provider Fraud Screen Reader Superfish Remote Worker Computer Repair Crowdsourcing Meetings Bluetooth Employee-Employer Relationship Dark Web Motherboard Supercomputer Cryptocurrency Enterprise Content Management Finance Downloads Augmented Reality G Suite History Proactive IT Theft Cyber Monday technology services provider Retail Cortana Spyware Tracking Course User Error Language Physical Security Wires Human Error Migration Wasting Time Display Taxes Shortcut Typing Cost Management E-Commerce Smart Tech 3D Printing Google Maps Hacks ROI Best Practice Connectivity Data Warehousing Marketing Processors Firefox IT Budget Bitcoin Vulnerabilities Authentication Operations Buisness Heating/Cooling Cabling IT Consulting WPA3 Financial Technology Assurance Group ’s 18 Gadgets Enterprise Resource Planning Bookmarks Computing Infrastructure Office Tips Permission Technology Tips Chatbots Database Update WannaCry Hard Drive Features Unsupported Software Virus Time Management Wearable Technology Notes Point of Sale Hacking Microsoft Excel Modem Windows 8 Save Time Geography Authorization Multi-Factor Security Servers Data Breach Fleet Tracking Procurement Distributed Denial of Service Annual Convention Social Engineering USB Identities Mobile Favorites Printer Alerts Regulation Web Server Cameras Motion Sickness CCTV Administrator Relocation Students Printers Hard Disk Drive Webcam Teamwork IT Consultant Error Emergency Cybercrime Shared resources CrashOverride