facebook linkedin twitter

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips User Tips Mobile Devices Smartphones Gadgets Business Continuity Innovation Disaster Recovery Android Social Media Microsoft Office Virtualization Network VoIP Mobile Office Data Backup Mobile Device Management Server Collaboration Communication Smartphone Miscellaneous Data Recovery Productivity Ransomware Upgrade Windows 10 Tech Term Unified Threat Management Windows IT Support Facebook Remote Monitoring communications Operating System Passwords Holiday Cybersecurity Mobile Computing Managed IT services Vendor Management BYOD Apps Remote Computing Users BDR WiFi Phishing Marketing Mobile Device The Internet of Things Analytics Automation Apple History Firewall Outsourced IT Artificial Intelligence Internet of Things Browser Save Money Managed IT Services Data Management Alert Big data Encryption IT Consultant App Content Filtering Bandwidth Maintenance Going Green Printer Spam Bring Your Own Device Health Antivirus Gmail Office Lithium-ion Battery Cybercrime Best Practice Information Technology Managed IT Virus Tech Support Cost Management Cloud Computing Business Technology Help Desk Hiring/Firing Office 365 Hard Drives Wireless Technology Budget Search Saving Time Two-factor Authentication Windows 10 Outlook Windows 8 Recovery Update Employer-Employee Relationship Access Control IBM Hacking Money Blockchain Document Management Phone System Computers VPN Travel Training Website Government Law Enforcement Managed Service Risk Management Humor Hard Drive Compliance Data storage Mobility Save Time It Management Information Networking Legal Running Cable Administration Proactive IT Regulations Healthcare Customer Service Twitter SaaS Intranet Education Applications Fax Server iPhone Robot Securty File Sharing Solid State Drive Word Excel Business Intelligence Google Maps Digital Payment Customer Relationship Management Flexibility Password Cortana Black Market Value Social Engineering Router Downtime Augmented Reality Cryptocurrency Data Security Hacker PowerPoint Laptop Comparison Tablet Patch Management Business Growth Company Culture Data Loss Computer Repair Scam User Social Networking Current Events Paperless Office Data Breach Machine Learning Social Sports Digital Avoiding Downtime Computing Project Management Wireless Telephone Systems Disaster End of Support Websites DDoS Hosted Solution Lifestyle Storage Streaming Media Public Cloud Start Menu Tech Terms Mobile Technology Pain Points IT service Conferencing Software as a Service Identity Theft Retail Uninterrupted Power Supply Net Neutrality Bluetooth eWaste Chrome Politics Monitoring Bitcoin Virtual Reality Emails Automobile Data Protection Gaming Console Computer Accessories Chromebook Google Docs Management Processors Computing Infrastructure Experience Hack Monitors Text Messaging How To Cleaning USB Trending Webcam Presentation Private Cloud Vulnerabilities Mouse Download Office Tips Redundancy Telephony YouTube User Error Vendor Specifications Safety Programming Co-managed IT Virtual Desktop Statistics Evernote Network Congestion Unified Communications Settings Microchip Taxes Documents Inbound Marketing Distributed Denial of Service Entertainment Heating/Cooling Distribution Data Warehousing Analytic Permissions Piracy Licensing Language Upload Navigation Recycling Hacks Physical Security Smart Tech Access Product Reviews Relocation Fiber-Optic Tablets Database Data Analysis Emergency PDF Hard Drive Disposal Banking Botnet HTML switches Writing Telephone System Best Practives Microsoft Excel Read Sync Music Mobile Security GDPR Best Available Computer Care Keyboard CCTV Upgrades Multi-Factor Security Cost Google Drive Windows Server 2008 Domains Software License Trends Tech Notifications Spyware Mobile Payment Public Speaking Upselling Reliable Computing LiFi Fraud Tactics Fileless Malware Vulnerability Device Management Business Metrics Computer Malfunction Devices Microserver Business Managemenet Proxy Server Content Management Video Surveillance In Internet of Things UTM Content Modem Electricity Printing Shortcut Deep Learning Legislation Error Get More Done Electronic Medical Records Troubleshooting Windows 7 IT Plan Work/Life Balance Enterprise Resource Planning Term Entrepreneur Saving ZTime cache HIPAA Television Scalability Visible Light Communication email scam Memory Addiction Printer Server Directions Environment online Currency Motion Sickness Accountants A.I. Turn Key Competition Harddrive Messenger IT consulting Tracking Trojan Dark Web Electronic Payment Debate Multi-factor Authentication SSID WannaCry Downloads Rental Service Meetings Wireless Headphones Telephone Health IT Time Management Business Owner Freedom of Information GPS Migration Connected Devices Organize Processing Corporate Profile LinkedIn Assessment SharePoint IP Address Advertising Cabling Flash Network Management Managed IT Service External Harddrive CIO Web Server Equifax Fleet Tracking Google Calendar Application Skype Books Windows XP Workers Bookmark Tip of the week Human Resources Archive Wi-Fi Staffing Administrator Google Wallet Device security MSP Thin CLient Supercomputer Displays Nanotechnology Social Network Touchscreen News 3D Ebay Society Desktop Finance Google Play VoIP Consultation Point of Contact Business Cards Worker Service Level Agreement Webinar Processor Knowledge Smart Phones Micrsooft Startup Asset Tracking Digital Signature Technology Tips Reading Unified Threat Management Samsung Backup and Disaster Recovery Browsers Virtual Assistant Drones Username Leadership Employer Employee Relationship Screen Reader Customer Resource management User Tip Fake News Adminstration Pirating Information G Suite Gamification Security Cameras Teamwork Audit Printers Managing Stress Productuvuty Regulation 3D Printing CrashOverride Cooperation Medical IT Capital