Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ Wiktionary.org offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 January 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Recycling Monitors Files Save Money Proactive IT Bookmarks Authentication Enterprise Content Management Smartphone IT Technicians Software Taxes Vulnerability Customer Service Cables Employees Social Media Backups Chatbots PowerPoint Black Friday Halloween Favorites Mobility VoIP Staffing Screen Reader Distributed Denial of Service Gadgets Backup and Disaster Recovery Smart Technology Quick Tips Printer Office Big Data Phone System Innovation Business Management Browser Passwords Smart Tech Electronic Medical Records Productivity Save Time Cooperation Chromebook Twitter Consumers Security Virtual Desktop CCTV Administration Windows 10 Mobile Devices Virus App Password Shortcut Alerts GPS Employee-Employer Relationship Mobile Device Management Health Information Intranet IT Services Help Desk Travel Botnet Remote Worker Financial IT Support Instant Messaging Trending Wi-Fi Internet Webcam Features High-Speed Internet Cameras VPN Managed IT services Software as a Service Enterprise Resource Planning IT Management Environment Small Business Business Computing Outlook Wires Meetings Customer Relationship Management Regulations Windows Cyber Monday Cybercrime Hardware ROI Google Maps Safety Entrepreneur Motion Sickness Machine Learning Co-managed IT Permissions Running Cable Wireless Technology Content Filtering Collaboration Update Specifications Virtual Private Network End of Support Tip of the week Software Tips Router Website File Sharing Network Security How To Mobile Device Managment Proactive Star Wars Virtual Reality Computer Care Settings communications Fraud Data Security Drones Saving Money Best Practice Telephony Work/Life Balance Geography The Internet of Things Samsung Law Enforcement Private Cloud IT Consultant Business Continuity Break Fix Notifications SaaS PDF Technology Laws Google Drive Writing IT Budget Business Growth Time Management Business Intelligence Current Events Hiring/Firing Language Hosted Solution Websites Security Cameras Disaster Hacks Productivity Touchscreen Mail Merge Dark Data Managed Services Provider Remote Monitoring Licensing Holiday Apple Infrastructure Windows 8 Data Management Unsupported Software Project Management Tablet Managed IT Microsoft IT service Spyware Techology Network Management Computers Piracy Unified Threat Management Document Management IT Support Hacking Cloud Company Culture Cloud Computing Recovery Assessment Cortana Mobile Security IT solutions Best Practices Identities Employer-Employee Relationship Applications Experience Lenovo Printing Web Server Asset Tracking Typing Mobile Office G Suite Gmail Blockchain Mobile Data Backup Risk Management Efficiency Gadget Retail IBM Net Neutrality Physical Security Legislation Scary Stories Servers Hacker Politics Unified Threat Management Alt Codes Microsoft Office Google Wallet Technology Unified Communications Compliance Education Analyitcs Nanotechnology Google Word Phishing Undo Presentation Miscellaneous WiFi Vendor Management Identity Theft Patch Management Troubleshooting YouTube Bring Your Own Device Display Communication Authorization WannaCry Firefox BDR Office 365 Users User Tech Terms Budget Competition Tech Support Utility Computing Consulting Two-factor Authentication Conferencing User Error Encryption Cache Fun Management Alert Artificial Intelligence Administrator Bitcoin Information Technology Social Documents Wireless USB Monitoring Managing Stress Hackers Domains Firewall Electronic Health Records Public Speaking Microsoft Excel User Tips Corporate Profile VoIP Cabling Digital HIPAA Data loss Server Read Only Business Technology Upgrades Tracking Mouse SharePoint Access Control Technology Tips Windows 10 Virtualization Privacy Statistics RMM Managed Service Provider Address Government Computer Computing Heating/Cooling Chrome Google Calendar Upgrade Mobile Device Business Owner Public Cloud Staff Uninterrupted Power Supply Cleaning Remote Computing Superfish Telephone Systems Consultation Outsourced IT Server Management Social Networking Buisness Relocation Training Cyberattacks Processors Flexibility Permission Test Network Vulnerabilities Apps Marketing LiFi Ransomware Storage Email IP Address How To Office Tips Knowledge Multi-Factor Security Laptop Wearable Technology Scam Bluetooth Programming Dark Web Tip of the Week Internet of Things Hotspot Motherboard Android Healthcare Legal Emoji Digital Signature Hard Drive Deep Learning Remote Monitoring and Management Avoiding Downtime Cybersecurity Facebook Analytics Remote Workers Managed Service Disaster Recovery Personal Information Automobile OneNote Point of Sale Zero-Day Threat Sports Data Breach Maintenance Computer Repair Lithium-ion Battery Internet Exlporer WPA3 Search Hosted Solutions Digital Payment Downloads Robot Crowdsourcing Workplace Tips Cryptocurrency Malware Bandwidth Theft Data storage Backup Network Congestion Networking Mobile Computing Data Warehousing Connectivity Saving Time Tech Term Cookies IT Consulting Antivirus eWaste Migration CIO Supercomputer Identity Mobile Data Solid State Drive Going Green Comparison 3D Printing Finance Mirgation Hard Drives Disaster Resistance Fleet Tracking Hard Disk Drive Modem Operating System Smartphones 5G Refrigeration Humor Computing Infrastructure Cost Management Black Market Spam Procurement Managed IT Service Paperless Office Managed IT Services History iPhone Sync Operations Augmented Reality Redundancy Data Recovery Error E-Commerce Data Application Development Social Engineering Automation BYOD MSP Business Google Docs Downtime IoT Human Error Money

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code