facebook linkedin twitter

Computerware Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Business Management Software Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Email Business Saving Money Hosted Solutions Malware IT Services Google Efficiency IT Support Small Business User Tips Mobile Devices Computer Smartphones Quick Tips Innovation Business Continuity Gadgets Microsoft Office VoIP Disaster Recovery Data Backup Network Android Social Media Collaboration Productivity Mobile Office Virtualization Communication Server Mobile Device Management Smartphone Data Recovery communications Miscellaneous Windows 10 Upgrade Tech Term IT Support Ransomware Unified Threat Management Windows Cybersecurity Remote Monitoring Vendor Management Passwords Facebook Holiday Operating System Remote Computing Mobile Computing Apps Phishing BYOD Managed IT services WiFi BDR Analytics Automation Users Apple The Internet of Things Data Management Mobile Device Marketing Outsourced IT Firewall Internet of Things History Save Money App Alert Managed IT Services Artificial Intelligence Browser Encryption Big data IT Consultant Health Windows 10 Content Filtering Spam Going Green Office 365 Bring Your Own Device Bandwidth Gmail Maintenance Antivirus Printer Office Cloud Computing Cost Management Best Practice Information Technology Lithium-ion Battery Hiring/Firing Windows 8 Hard Drives Outlook Training Budget Two-factor Authentication Help Desk Saving Time Wireless Technology Business Technology Tech Support Search Managed IT Virus Cybercrime Phone System Hacking Money Document Management IBM Healthcare Access Control Computers It Management VPN Travel Blockchain Recovery Employer-Employee Relationship Update Risk Management iPhone Legal Save Time Networking Information Regulations SaaS Augmented Reality Running Cable Proactive IT PowerPoint File Sharing Customer Service Hard Drive Humor Law Enforcement Applications Administration Twitter Intranet Managed Service Mobility Website Education Government Compliance Data storage Retail Cryptocurrency Word Avoiding Downtime Data Breach Laptop Business Intelligence Password Cortana Business Growth Value Current Events Project Management Digital Digital Payment Hacker Websites Router Downtime Management Machine Learning Excel Tablet Paperless Office Vulnerabilities Telephone Systems Comparison Company Culture Sports Customer Relationship Management Computing Computer Repair Fax Server Disaster User Social Networking Hosted Solution End of Support Social Robot Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Data Loss Social Engineering Flexibility Scam Black Market Redundancy Inbound Marketing Computing Infrastructure Hack Monitoring How To eWaste Google Docs Net Neutrality Evernote Private Cloud Experience Chrome Download Cleaning Pain Points Monitors Co-managed IT User Error Office Tips Telephony Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Distributed Denial of Service USB Mobile Technology YouTube Presentation Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Lifestyle Vendor Uninterrupted Power Supply Mouse Specifications Safety Vulnerability Virtual Desktop Gaming Console Bitcoin Programming Identity Theft Statistics Windows 7 IT service Text Messaging Network Congestion Documents Data Protection Webcam Distribution Entertainment Heating/Cooling Politics Storage Virtual Reality Bluetooth Streaming Media Conferencing Automobile Emails Chromebook Devices Messenger Tracking Domains Voice over Internet Protocol Tip of the week Work/Life Balance Read Fraud Tactics Trojan Fileless Malware Google Calendar Deep Learning Public Speaking Organize Modem Touchscreen News Visible Light Communication Adminstration Memory Pirating Information Proxy Server VoIP Leadership UTM Content Rental Service Meetings IT consulting Legislation Error Cabling Electronic Medical Records Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation Accountants A.I. Books Workers Troubleshooting Recording Virtual Assistant Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Business Managemenet HIPAA SSID Fake News Advertising Flash Environment Dark Web Audit CIO Multi-factor Authentication Supercomputer Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Staffing Google Wallet online Currency Migration Connected Devices Competition Webinar Processing Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Access Upselling Displays Employer Employee Relationship IP Address Microsoft Excel Video Surveillance G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Drones Saving ZTime Desktop Finance Hacks Physical Security Application Google Play Skype Startup Asset Tracking Relocation Tablets Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Medical IT Permissions Language Debate Unified Threat Management Backup and Disaster Recovery Sync Best Practives Browsers Electricity Printing Harddrive Username Security Cameras GPS Point of Contact Screen Reader Customer Resource management User Tip Gamification Notifications CCTV Digital Signature Writing Smart Tech Reliable Computing Microserver Solutions External Harddrive Music Piracy Upload Business Metrics Computer Malfunction Teamwork Navigation cache Television switches Professional Services Fiber-Optic Database In Internet of Things Data Analysis WannaCry Downloads Upgrades HTML GDPR Time Management Freedom of Information LiFi 3D Ebay Analytic Telephone System PDF Get More Done Corporate Profile Thin CLient Recycling Mobile Security Product Reviews Multi-Factor Security Cost Scalability Turn Key Integration Smart Phones Software License Trends Motion Sickness Best Available Keyboard Printer Server Tech Assessment SharePoint Regulation CrashOverride 3D Printing Capital Productuvuty Printers Managing Stress

toner1