Fuse Networks Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Other Options for Visual Excel Data
Information Technology: How to Handle the Inevitab...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Hackers Business Computing Privacy Android Data Backup Innovation Data recovery Computer Data Software IT Support Efficiency Cybersecurity Collaboration Productivity User Tips Mobile Device Google Malware Internet Communication IT Services Email Smartphone Business Management Communications Phishing Browser Managed Service Blockchain Office 365 Backup Information Cybercrime Cost Management Hardware Applications Artificial Intelligence Access Control Small Business Cloud Business Technology Microsoft Office Saving Money Maintenance Social Media Business Ransomware Scam Mobile Device Management VoIP Mobile Devices Facebook Two-factor Authentication Passwords Data Security BDR Workplace Tips Hosted Solutions Apps Holiday Bitcoin Managed IT services Cloud Computing Users Data Breach Alert Quick Tips Patch Management Automation Google Maps Windows 10 Social Engineering Smartphones Printer Vulnerability Remote Monitoring Conferencing Update Saving Time Disaster Recovery Internet of Things Gmail Hacking Bandwidth Vulnerabilities Data loss Microsoft Vendor Tech Terms Document Management Websites Network Mobility Gadgets Budget Desktop Legislation Trends Television Entertainment Networking Compliance Backup and Disaster Recovery WiFi Error Sports Training Business Continuity Google Docs Support email scam HTML Managed Service Provider App Unified Communications Tech News Mobile Technology Addiction Help Desk Digital Multi-factor Authentication Computers Audit Processor Big Data project management Piracy Disaster Apple Gamification Mouse Data Analysis Website Business Cards Regulations Telephone Equifax Service Level Agreement CIO Miscellaneous eWaste VPN Screen Reader Printing Term Fake News Virtual Reality Emergency IT Management Vendor Management Virtual Assistant Device security Nanotechnology Navigation Money Software License Excel Antivirus Emails Fileless Malware Social Network User Tip Company Culture Startup Going Green Bookmark Robot Data Protection Government Monitoring Google Play Spam Microsoft Excel Machine Learning Operating System Computer Care Travel Outsourced IT Windows 10 Tip of the week Bluetooth Directions Virtualization Paperless Office Customer Resource management Identity Theft Download Comparison Browsers Legal Management Health IT Security Cameras Knowledge Network Management Google Calendar NCSAM Hard Drive Username Evernote Distributed Denial of Service Information Technology Analytics Managed IT Services Mobile Security Wireless Headphones Content Cost Augmented Reality Database Downloads Telephone System Cryptocurrency Laptop Upload Specifications Computing Infrastructure Devices Chromebook Law Enforcement Computing Social Accountants Encryption IT Hard Drive Disposal Fuse Networks Healthcare Freedom of Information Proxy Server Cleaning BYOD Microchip Productivity SharePoint Downtime Cortana Tactics Electronic Medical Records Router Competition Customer Relationship Management IP Address Hiring/Firing Twitter Modem Regulation Customer Service Mobile Office Fun Upgrade Domains Employer-Employee Relationship SSID Wireless Printers Managing Stress Public Speaking Presentation Wi-Fi Hard Drives Lithium-ion battery Search Multi-Factor Security Server Tech Support Wireless Technology 5G Safety IBM Marketing Hacker The Internet of Things