Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Quick Tips Samsung Flexibility Consumers Vendor Management Database Money Big Data Disaster Recovery Backups Windows 10 Saving Time Backup IT service Word Antivirus Distributed Denial of Service Mobility Comparison WPA3 Shortcut Instant Messaging RMM Applications Mobile Computing Corporate Profile Windows 10 Finance IT Management Social Networking Security Address communications Hacking Travel Productivity Processors Drones Operating System Hiring/Firing Firewall Bitcoin Social Cloud Migration Identity Business Management The Internet of Things Help Desk Running Cable Recovery Access Control PowerPoint CCTV Unsupported Software Emoji IT Support Laptop Business Technology Data loss Analytics Vulnerabilities Tablet Smart Tech Router Permissions Passwords CIO Cortana Managed IT Service 3D Printing Private Cloud Meetings Patch Management User Tips Language YouTube Display Computer BDR Buisness Infrastructure Government Troubleshooting Authentication Solid State Drive Administrator Remote Computing Identity Theft Cybersecurity Healthcare Collaboration Upgrade Compliance Tracking Gadgets Productivity Unified Threat Management Managed Service Provider Experience Domains Disaster Firefox Outsourced IT Licensing Information Customer Relationship Management Features Scary Stories Ransomware Humor Search Gmail Automobile Blockchain Encryption History IT Budget Managed IT Services Procurement Touchscreen Business Growth Windows 7 Wireless Technology Identities Dark Web Microsoft Office Taxes Technology Tips Staff Cyber Monday Asset Tracking How To Health User Twitter Security Cameras VPN Electronic Medical Records Modem Google Docs Enterprise Resource Planning Analyitcs Data Backup Legislation Virus Retail Crowdsourcing Business Continuity Computer Repair Hosted Solution Paperless Office Virtual Private Network Malware Point of Sale Software Tips Data Management HIPAA Office Tips High-Speed Internet Refrigeration Cost Management Upgrades Wi-Fi Virtualization Co-managed IT Web Server Managing Stress Work/Life Balance Employee-Employer Relationship Black Friday Permission Settings Technology eWaste Backup and Disaster Recovery Fleet Tracking Mobile Office IBM Telephone Systems SaaS Programming IT Consultant Screen Reader Typing Lithium-ion Battery Two-factor Authentication Trending Saving Money Data Warehousing Cache Notes Lenovo Safety Consulting Employees Project Management Digital Supercomputer Network Congestion Data storage Avoiding Downtime Mobile Devices Consultation Uninterrupted Power Supply Save Money Cyberattacks Digital Payment Time Management Techology Downtime Writing Mobile Data Save Time Artificial Intelligence Augmented Reality Current Events Chrome Break Fix Content Filtering Cryptocurrency Authorization Google Wallet Password End of Support Tip of the week Development Professional Services File Sharing Dark Data Personal Information Business Owner Network Entrepreneur Social Media Websites Server Electronic Health Records Undo Wires Conferencing Wireless Monitoring Spyware Financial Remote Workers Google Calendar Knowledge Software as a Service VoIP Apps Law Enforcement Theft Vulnerability Budget Hard Drive Hosted Solutions Fraud Information Technology Politics Virtual Desktop Users Mobile Security VoIP Motherboard Monitors Deep Learning Environment Update Facebook Google Maps Mobile Office 365 Unified Threat Management Document Management Apple Tech Terms Proactive IT Mobile Device Remote Monitoring Mail Merge Digital Signature Phone System Android Test Management Google Drive IT solutions Server Management Operations How To Administration Innovation Wearable Technology Recycling Sports Downloads Voice over Internet Protocol Windows GPS Public Cloud Intranet Mouse Wasting Time Training Specifications Communication Remote Worker Documents Printing Printer Miscellaneous Managed Services Provider Phishing Office Tip of the Week OneNote Workplace Tips Network Management Network Security MSP Star Wars Legal Computers Business Intelligence 5G Notifications Telephony Networking Internet Cameras App Company Culture iPhone Proactive Hacker Data Breach Smart Technology Relocation Piracy Google Motion Sickness Business Computing Managed Service Automation E-Commerce Scam Cookies Website LiFi Alert Bluetooth SharePoint Servers Cables Smartphones IT Support Virtual Reality G Suite Chromebook Education Microsoft Gadget Robot Mirgation Managed IT services User Error Holiday Maintenance Remote Monitoring and Management Small Business Computer Care Read Only Cabling Software PDF Hard Disk Drive IoT Internet Exlporer Cooperation Hotspot Redundancy Data Security Competition Microsoft Excel Hard Drives Net Neutrality Best Practice Internet of Things Technology Laws Halloween IT Services Windows 8 Regulations Heating/Cooling Human Error Marketing Alerts Privacy Fun Disaster Resistance Customer Service Staffing Outlook Smartphone Files Mobile Device Managment Webcam Hacks Computing Infrastructure Botnet BYOD Data Recovery Superfish WiFi Data Tech Support Social Engineering Risk Management Tech Term USB Utility Computing Computing Cybercrime IP Address ROI Nanotechnology Multi-Factor Security Cloud Computing Virtual Assistant Mobile Device Management Zero-Day Threat Browser Bandwidth Storage Going Green WannaCry Hackers Employer-Employee Relationship Physical Security Sync Public Speaking Enterprise Content Management Efficiency Alt Codes Application Connectivity Managed IT Unified Communications Machine Learning Geography Email Best Practices Favorites Black Market Business Assessment Cleaning Bookmarks Statistics IT Technicians IT Consulting Bring Your Own Device Chatbots Error Presentation Spam Hardware

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code