About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Customer Service IT Management Reliable Computing Alert Quick Tips Freedom of Information Worker Gmail DDoS Hard Drive Fileless Malware How To communications Chamber the Internet of Things Virtual Assistant Telephony Bring Your Own Device Cybercrime Windows 7 Micrsooft Cryptocurrency Managed Service Managing Stress Unified Communications switches Education Inbound Marketing Administrator Skype Gamification Cost Management Navigation Bata Backup Tablet Memory clout services Monitors Spyware Browser Mobility Web Server Save Money Software License File Sharing Data Breach Wireless Technology Solutions Risk Management Remote Monitoring Best Practices Unified Threat Management Thank You App Data Backup Mobile Devices Budget Relocation Computer Repair BDR History Save Time Entrepreneur Saving Money Monitoring Multi-factor Authentication Workers Word 3D Printing Keyboard Artificial Intelligence Google Drive Business Proactive IT Scalability Tech Terms Machine Learning Backup Rapid City Windows XP Disaster Recovery IT service Language Music Flash Hacks Big data Telephone Systems Co-Managed IT Microsoft uptime LiFi Samsung Managed IT services Best Available Processor Bluetooth Avoiding Downtime Remote Computing Programming Hacker Windows10 Windows 10 Facebook Knowledge Outsourced IT Messenger Drones Text Messaging eWaste Congratulations outsource cloud computing Visible Light Communication Screen Reader IP Address Website Cache Update Microsoft Office Gadgets Fleet Tracking Blockchain Processing Wireless Headphones Audit Settings Virtualization End of Support Information cloud computing IT Consultant Health IT Accountants Dark Web Automobile Windows Training Cost Administration Twitter Electronic Payment Taxes Data Protection Touchscreen Productivity Augmented Reality HTML Business Intelligence hardware Trending Multi-Factor Security Telephone System Advertising Trends Shortcut Consultation Data Analysis Analytic Integration Firewall Office Privacy Computer Accessories Chromebook Outlook Social Managed IT Services Fraud Wi-Fi Work/Life Balance Content Filtering Telephone Internet Start Menu Google Docs Automation Hard Drives Printing Medical IT Tracking G Suite Books Electronic Medical Records Statistics Hosted Solutions Bookmark PowerPoint Modem Society Experience Business Computing Encryption Technology Securty Username Motion Sickness Phone System Vulnerabilities Directions outsource cloud storage Downloads Network Value Office 365 Public Cloud Healthcare Compliance IT Support Downtime Entertainment Robot Managed IT Service Bandwidth Heating/Cooling Saving Time Windows Server 2008 Piracy Gaming Console Logistics Google Wallet Digital Payment Electricity Business Cards Asset Tracking Retail Uninterrupted Power Supply Tech Support Virus Google Maps Documents Mouse IT Support Google Play Unified Threat Management Rental Service Banking Passwords Malware Computing IT Services Capital Service Level Agreement Citrix Xenapp CCTV Document Management Download Microsoft Excel Proxy Server Antivirus Network Congestion Solid State Drive Emails Office Tips Excel Smartphones Vulnerability email scam Supercomputer Data Management Legal Security Cameras Disaster IBM Customer Resource management Google Calendar Spam Employer Employee Relationship Safety CrashOverride Intranet Scam User Tips Travel Paperless Office Nanotechnology Business Mangement Lithium-ion battery Websites Management A.I. Finance Access CIO Vendor Management VoIP Device security Licensing Teamwork Best Practice Legislation Printers Router Mobile Device Migration Webcam Internet of Things Regulations Deep Learning Presentation Troubleshooting Mobile Device Management Current Events Desktop Innovation Regulation Server Meetings Backup and Disaster Recovery Tactics Displays Startup Identity Theft Miscellaneous Digital Password Collaboration iPhone Social Network Business Technology Managed IT Communication Hard Drive Disposal Running Cable In Internet of Things Net Neutrality Addiction Staffing Phishing Domains Information Technology Specifications Politics Productuvuty Network Security Sports Corporate Profile Mobile Computing Voice over Internet Protocol Tablets Professional Services Computer Care Help Desk cloud SharePoint Television Fake News Efficiency Social Networking Devices Data Recovery Wireless Virtual Desktop Money User Tip Enterprise Resource Planning Comparison Emergency Microchip UTM Processors Read Flexibility Data Security Digital Signature Streaming Media Competition Technology Tips Vendor Patch Management Cooperation Business Owner Bitcoin Customer Relationship Management Data Loss Browsers Pain Points Computer Business Continuity Mobile Security Private Cloud Storage Google Company Culture SSID Permissions Social Media Environment IT Plan Access Control USB Users Managed Service Provider Upgrade Smartphone Software as a Service IT Applications Botnet Equifax Ransomware Marketing SaaS Going Green Computing Infrastructure Tip of the week Android MSP Tip of the Week Project Management Time Management Smart Tech Health Fiber-Optic Vendor Mangement Conferencing Writing Data storage Windows 10 cloud storage Data HIPAA Laptop Productivity Printer IT consulting BYOD WannaCry Hack Chrome Data Warehousing Physical Security Cleaning User Computer Malfunction Distributed Denial of Service Law Enforcement Database GDPR Evernote Upgrades Assessment Holiday Error Business Management Apps Redundancy Small Business Human Resources Search Mobile Technology Apple Tech Term Operating System VPN Application Connected Devices Computers cyber security Mobile Payment Distribution Network Management Email Content YouTube Recovery Windows 8 Employer-Employee Relationship Security Software User Error Cybersecurity Business Growth Hiring/Firing VoIP WiFi Black Market Tech Hosted Solution Public Speaking Patching Government Cortana Cabling Reading Hacking Microsoft 365 Sync Product Reviews Virtual Reality Hackers Social Engineering PDF Maintenance Notifications Upload Term Workplace Tips News Business Metrics Networking Two-factor Authentication Analytics

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150