Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows 7 Mobile Technology G Suite Storage Database Quick Tips Nanotechnology Bluetooth Marketing Document Management Browser Printer Applications Start Menu Privacy Business Continuity Read Business Computing Regulation Email Administration Wi-Fi Error Business Flexibility Freedom of Information Assessment Patching Hacker Computer Application Small Business Training Bitcoin Capital Keyboard email scam User Securty Social Media Best Available Collaboration Congratulations Fake News Recovery Business Owner Environment Phone System Multi-factor Authentication Encryption Supercomputer Username Travel Firewall Music Bookmark Thank You Mobile Devices Tracking Password Bring Your Own Device Avoiding Downtime 3D Printing Saving Time Private Cloud Laptop Windows Server 2008 A.I. Unified Communications Corporate Profile Remote Monitoring Tip of the week IT Plan Data Warehousing Windows 10 VPN Alert BDR Physical Security Health Modem Government Two-factor Authentication Information Customer Service Social Engineering Identity Theft Windows 10 Samsung Blockchain Trending Managed IT Windows XP In Internet of Things Managed IT Service Update Society Robot Social Networking Deep Learning Cabling Micrsooft IT Support Emergency Domains Television Legislation Health IT Bandwidth Best Practice Unified Threat Management Cryptocurrency Spyware Business Metrics Android Troubleshooting Cybercrime Teamwork Screen Reader Proxy Server Statistics Specifications Computer Repair Safety Skype Innovation Server MSP IT Support Business Growth Going Green Data Backup Permissions SSID Business Technology switches Saving Money Networking Hard Drives IT Migration Staffing Artificial Intelligence User Error Digital Signature Managed Service Provider Machine Learning Pain Points Electricity Connected Devices IT Services uptime Apple Business Mangement Save Time Employer Employee Relationship Hacking Finance Managing Stress Notifications Company Culture Vulnerabilities Distributed Denial of Service the Internet of Things Data Protection Upload Data Recovery Apps Mouse Best Practices Microsoft Windows10 cloud computing Project Management Vendor Management Citrix Xenapp Bata Backup Competition User Tip Memory Technology Tips Human Resources Network History Mobile Computing Work/Life Balance Router Product Reviews Digital Payment Outlook Download Managed Service Office Tips Phishing Windows Microsoft Office Enterprise Resource Planning iPhone Operating System Time Management PowerPoint Public Cloud Webcam Hack Network Security Law Enforcement Excel Asset Tracking Tech Support Monitors How To Ransomware Virtualization IT consulting Employer-Employee Relationship Cleaning Botnet Tech DDoS Gadgets Automation Value GDPR Business Intelligence CIO Emails Data storage Software Save Money Fileless Malware Streaming Media Patch Management Tip of the Week cloud Google Windows 8 Computers Security Net Neutrality Wireless Headphones Sync Entrepreneur Access Addiction Fraud Cost Users Access Control Chrome Evernote Smartphones Reliable Computing Virtual Assistant Mobile Security USB Social Network Computing communications Data Analysis Malware Virtual Desktop Intranet Productivity Technology Cortana Drones Security Cameras Black Market Workers Distribution Data Management Telephony Hosted Solutions Rental Service Passwords Scalability App IP Address cyber security Reading Meetings Help Desk Information Technology Documents eWaste Big data Programming Computer Malfunction Internet of Things Analytic Paperless Office Settings Hard Drive Disposal Fleet Tracking Holiday Scam PDF Lithium-ion battery Communication Outsourced IT Tablet User Tips Text Messaging Solid State Drive Licensing Directions Processing Taxes IT Consultant VoIP Downloads UTM Trends Network Congestion Navigation Productuvuty VoIP Hackers Data Breach Google Play Motion Sickness Network Management Vendor Mangement Entertainment HIPAA Desktop Customer Relationship Management Experience Management Relocation Virtual Reality Business Cards Computing Infrastructure Workplace Tips Disaster Recovery Mobile Payment Hard Drive Proactive IT Redundancy Healthcare Term Tablets Cache Twitter Managed IT Services Public Speaking Augmented Reality Website Printers Service Level Agreement End of Support Worker Telephone Systems Digital Google Wallet Advertising Hiring/Firing Consultation Visible Light Communication Software as a Service Managed IT services Word cloud storage Money Tactics CrashOverride Cost Management Fiber-Optic Devices Touchscreen WiFi Running Cable IT Management Processors Writing Inbound Marketing Social Hacks Flash Spam Remote Computing Virus Office Books Data Loss Microchip Device security Downtime Search Productivity Language Electronic Medical Records Web Server WannaCry Maintenance outsource cloud computing Processor Legal Office 365 HTML YouTube Compliance outsource cloud storage Smart Tech Websites Displays Mobile Device Management Equifax Disaster Tech Term Regulations Google Drive Content Filtering Printing Audit Gamification Computer Accessories clout services Computer Care Facebook SharePoint Google Maps Administrator Data Security Miscellaneous Software License Efficiency Retail Startup Mobility File Sharing Chromebook Wireless Internet Backup Upgrades Politics Shortcut Gaming Console IBM Gmail Hosted Solution Upgrade Analytics Browsers Content Electronic Payment Mobile Device Messenger Dark Web Google Calendar LiFi Automobile hardware Vulnerability Backup and Disaster Recovery Smartphone Tech Terms Heating/Cooling Budget Risk Management Knowledge Cybersecurity Sports SaaS News Monitoring Presentation CCTV IT service Accountants Co-Managed IT Microsoft Excel Conferencing Unified Threat Management Current Events Vendor Google Docs BYOD Uninterrupted Power Supply Piracy Wireless Technology Education Comparison Data Banking Multi-Factor Security Telephone System Antivirus Business Management Customer Resource management Telephone

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150