Fuse Networks Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Other Options for Visual Excel Data
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Hackers Business Computing Privacy Innovation Productivity Data Backup Collaboration Android Cybersecurity Data recovery User Tips Computer IT Support Data Software Google Efficiency Communications Email Communication Mobile Device Malware Internet IT Services Business Management Office 365 Smartphone Hosted Solutions Hardware Mobile Devices VoIP Small Business Microsoft Office Cost Management Applications Facebook Browser Managed Service Artificial Intelligence Access Control Backup Business Technology Information Smartphones Social Media Cloud Phishing Blockchain Cybercrime Internet of Things Vulnerability Ransomware Vulnerabilities Scam Cloud Computing Automation Data Security Saving Money Business Windows 10 Holiday Mobile Device Management Workplace Tips Two-factor Authentication Passwords BDR Maintenance Apps Disaster Recovery Google Maps Social Engineering Quick Tips Hacking Remote Monitoring Update Data loss Managed IT services App Gmail Users Apple Outsourced IT Saving Time Cooperation Printer Websites Tech Terms Document Management Bitcoin Conferencing Network Mobility Vendor Healthcare Bandwidth Data Breach Microsoft Augmented Reality Alert Patch Management IT Management Productivity Tactics Electronic Medical Records Modem Cleaning BYOD Data Analysis Backup and Disaster Recovery Error Term Gadgets Budget Legislation Trends Government CIO Microsoft 365 Tip of the week Navigation Training Computer Care Vendor Management Professional Services Identity Theft Hard Drive Big Data Addiction User Tip SSID Distributed Denial of Service Information Technology Computers Virtualization Fileless Malware Website Twitter Telephone Comparison Google Play Gamification Legal Bookmark Managed IT Services Mobile Security Knowledge Google Calendar Computing Infrastructure Devices Equifax Service Level Agreement Voice over Internet Protocol Cryptocurrency Laptop Miscellaneous Screen Reader Directions Hard Drive Disposal Freedom of Information Nanotechnology Server Downloads Social Network Specifications Health IT Security Cameras SharePoint Downtime Emails Law Enforcement Browsers Evernote Networking Compliance Spam Startup Going Green NCSAM iPhone Desktop Monitoring Cost email scam HTML Windows 10 Machine Learning Analytics Medical IT News Mobile Technology Operating System Travel Cortana Paperless Office Customer Resource management Television Social project management Piracy Bluetooth WiFi Digital Multi-factor Authentication Management Business Continuity Google Docs Business Cards Regulations Download Managed Service Provider Unified Communications IT Retail Microchip eWaste VPN Network Management Audit Proxy Server Data Management Fake News Virtual Reality Username Disaster Database Telephone System Mouse Sports Router Money Software License Wireless Headphones Content Entertainment Virtual Assistant Device security Chromebook Computing Tech Upload Printing Support Windows 7 Excel Antivirus Processor Robot Data Protection Accountants Encryption Help Desk PowerPoint Microsoft Excel Company Culture Fuse Networks Emergency The Internet of Things Marketing Hacker Employer-Employee Relationship Customer Relationship Management Competition IP Address Hard Drives Solutions Customer Service Search Regulation Upgrade Printers Mobile Office Domains Integration Wireless Public Speaking Managing Stress Presentation Wi-Fi Lithium-ion battery Multi-Factor Security Hiring/Firing 5G Tech Support Wireless Technology IBM Fun Safety