crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 12 December 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Malware Email Business Software Data Mobile Devices Hardware IT Support Network Small Business Server Smartphones Communication Upgrade VoIP Computer Business Continuity Efficiency Mobile Device Management Innovation Google Windows Data Backup Disaster Recovery Microsoft Office Virtualization Outsourced IT Tech Term Social Media Network Security Miscellaneous Mobile Office Vendor Management Productivity Holiday Gadgets User Tips Quick Tips Passwords BYOD Mobile Computing Browser Android Smartphone Internet of Things Data Recovery Managed IT services Remote Monitoring WiFi Bring Your Own Device Windows 10 Best Practice Users The Internet of Things Operating System Ransomware Spam Alert Data Management Collaboration Save Money Trending Wireless Technology Apple Remote Computing Artificial Intelligence Firewall Office Customer Relationship Management Unified Threat Management Encryption Content Filtering Going Green History Gmail Maintenance Big Data App Analytics IT Solutions Lithium-ion Battery Facebook IT Support IT Consultant Managed IT Services Router Antivirus Printer Tech Support Current Events Information Technology Cloud Computing Managed IT Website Customer Service Hard Drives Applications Two-factor Authentication Windows 8 Phishing Bandwidth Document Management Humor Mobile Device Paperless Office Saving Time Wi-Fi Avoiding Downtime Employer-Employee Relationship Hacking Computers Fax Server Phone System Outlook Healthcare Health Government Compliance Marketing Automation Excel Office Tips Retail IT service Project Management Digital Payment Chrome Cybersecurity VPN Business Growth Risk Management Apps Application Virus Help Desk Office 365 Data Security iPhone User Error Password Co-Managed IT Downtime Infrastructure Administration Augmented Reality Presentation Budget Vulnerability Information Computer Repair Proactive IT Point of Sale Blockchain Regulations Recovery Managed Service Inbound Marketing Mouse Money BDR Files Running Cable Social Net Neutrality Licensing Wireless File Sharing PowerPoint Social Networking Unified Communications Training Tablet Windows 10 Computing Statistics Tip of the week Intranet Competition Business Intelligence Network Congestion Recycling eWaste Search Virtual Desktop USB Piracy Business Owner Remote Workers Sports Hacker User Programming Data loss Scam HIPAA Twitter Company Culture Analyitcs Education Redundancy Safety Specifications Settings Flexibility Hosted Solution IBM Machine Learning Cost Management Data storage Cybercrime communications Save Time IT Management Internet Exlporer Storage Wearable Technology Remote Monitoring and Management Conferencing Mobility Smart Technology Robot Hiring/Firing Mobile Security Alerts Printing Display IoT End of Support LiFi Remote Support Chatbots Features Leadership Sync Multi-Factor Security Fleet Tracking Skype Streaming Media Star Wars Zero-Day Threat New Additions Software Tips Managed IT Service Monitors Virtual Reality Deep Learning Print Server Geography Gaming Console Text Messaging Language Work Station Identity Electronic Health Records Mobile Device Managment Google Calendar Domains Google Wallet Asset Tracking LinkedIn Utility Computing Backup and Disaster Recovery Congratulations Break Fix Fun Writing SaaS Techology Word Law Firm IT High-Speed Internet Video Surveillance Server Management Computing Infrastructure Cyberattacks Legislation Public Speaking Drones Windows 8.1 Update OneNote Best Available Buisness Human Error Dark Web Cortana Social Engineering Chromebook Disaster Resistance Identities Development Cooperation Motherboard Read Only G Suite Backups Employee-Employer Relationship Environment CIO Hard Drive Permission Adminstration Data Warehousing Knowledge IT Consulting Solid State Drive Bluetooth Cables 3D Patch Management Staff Samsung Modem Bookmarks Travel Software as a Service Legal Online Currency Troubleshooting Debate Cache Test Microsoft Excel Experience Politics Data Breach Heating/Cooling Alt Codes Wires Computer Accessories Operations Crowdfunding Cookies Favorites Meetings Technology Tips Consumers YouTube Management RMM Virtual Private Network Telephony Technology Laws Typing Nanotechnology Instant Messaging Scheduling Comparison IP Address Google Drive How To Enterprise Resource Planning Tech Terms How To Permissions IT Technicians Monitoring Unified Threat Management Refrigeration Cryptocurrency Disaster MSP Touchscreen Screen Reader Finance Identity Theft Black Friday Google Docs Mobile Assessment Fraud Mirgation Consulting Access Control Bitcoin Digital Signature Proactive Memory Smart Tech Authentication Cyber Monday Laptop Managing Stress Managed Services Provider Private Cloud SharePoint Hacks Documents Connectivity Authorization Halloween Electronic Medical Records Business Technology Entrepreneur Enterprise Content Management Network Management Migration E-Commerce Macro PC Care Public Cloud Downloads Undo WPA3 PDF Value People Employees Distributed Denial of Service 5G Scary Stories Networking Vulnerabilities eBay Hotspot

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code