301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Protect Your Business This Year with a BDR
Your Technology May Fail, but You Can Still Succee...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Business Email Network Security Software Productivity Tech Term Internet Hosted Solutions Data Backup Computer Data Managed IT Services Mobile Devices Backup IT Support Microsoft Data Recovery Ransomware User Tips Productivity Google Outsourced IT Efficiency Managed Service Provider IT Services Smartphone Innovation Social Media Workplace Tips Hardware Android Encryption Cloud Computing Business Continuity Data Management Windows 10 Business Management Communication Collaboration Small Business Paperless Office Browser Remote Monitoring Office 365 Smartphones Server Disaster Recovery Save Money Bandwidth Managed IT Services Government Windows 10 Infrastructure Tip of the week Antivirus Vulnerability Wi-Fi App IT Management Cybersecurity Healthcare BDR Artificial Intelligence BYOD Unified Threat Management Phishing Work/Life Balance Facebook Virtual Reality Network Scam Windows Risk Management How To Mobile Device VoIP Two-factor Authentication Managed Service Information SaaS Passwords Holiday Maintenance Apps Applications Word Hosted Solution Office Politics Customer Relationship Management Employer-Employee Relationship Password Chrome Big Data Internet of Things File Sharing Document Management Money Compliance Blockchain Upgrade Chromebook Saving Money Gmail Remote Monitoring and Management Botnet Automation Regulations Patch Management Wireless IoT Automobile Vendor Management Storage Mobile Device Management Remote Workers Alert Machine Learning Health Identity Theft Data loss Point of Sale HIPAA Telephone Systems Samsung How To Electronic Medical Records Tech Support Physical Security Twitter G Suite VPN Mobile Security Quick Tips Data Security Computing Computer Care Business Technology Server Management Firewall Hacker Downtime Robot Smart Technology Taxes Virtual Private Network Training Recovery Remote Computing Router Websites Website Communications Meetings Search Mobile Read Only User Error Cybercrime Upgrades Processors Test Managed IT Service Modem Spyware Address Service Level Agreement E-Commerce Computing Infrastructure Value Administrator Avoiding Downtime Spam Wires Employees Specifications Law Enforcement Monitors CCTV Permissions Vulnerabilities Conferencing Google Calendar Webcam Company Culture Printer Wearable Technology Disaster Heating/Cooling WPA3 RMM Break Fix Cookies Education Utility Computing Features Alerts Time Management Cortana Black Market Zero-Day Threat Black Friday Social Networking Gadget Fraud Star Wars WiFi Networking Emoji Geography Instant Messaging Legislation Chatbots Crowdsourcing Cleaning Augmented Reality Managing Stress Help Desk Access Control Uninterrupted Power Supply Travel Servers Fleet Tracking Operating System Dark Web Nanotechnology Relocation Electronic Health Records Licensing Network Management Supercomputer Backup and Disaster Recovery Cyber Monday Motherboard YouTube Cost Management GPS IBM High-Speed Internet Finance Mouse Identity Managed IT Personal Information Professional Services Monitoring Private Cloud Analytics The Internet of Things Update Enterprise Content Management Bookmarks SharePoint Motion Sickness Asset Tracking Tech Terms Microsoft Excel Screen Reader Legal Management Cyberattacks Cooperation IT Support Touchscreen IT Budget Gadgets Budget MSP Human Error Settings Microsoft Office Hotspot Financial Assessment Office Tips Google Drive Tracking Development Authentication Tablet Corporate Profile Web Server Outlook USB Consulting Smart Tech Error Lenovo Unified Communications Favorites Downloads IT Technicians Solid State Drive Statistics Social Notifications OneNote Theft Sports Enterprise Resource Planning Files Unified Threat Management Staff Cabling Digital Payment Users IT Solutions Proactive Permission Distributed Denial of Service Digital IT Consultant Mail Merge Managed Services Provider Language Internet Exlporer VoIP Techology Customer Service Virtualization Cables Authorization Comparison WannaCry Cameras Shortcut Computer Repair Dongle Connectivity Firefox Staffing Superfish Bring Your Own Device Project Management Multi-Factor Security Mirgation Hard Disk Drive Bluetooth Employee-Employer Relationship Domains Public Speaking Printers CrashOverride Presentation Lithium-ion battery Emergency Regulation Wireless Technology 5G Hiring/Firing Safety Marketing Fun Competition IP Address Procurement Miscellaneous Hard Drives Mobile Office