Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Save Money Cabling Passwords Spyware Teamwork Hack Communication History CrashOverride Freedom of Information Content Evernote Society Work/Life Balance Bring Your Own Device Flash Education Virtual Reality Legislation Reading Virus User Tips Tip of the week Modem outsource cloud storage Health Experience Law Enforcement Mobile Technology Gmail Email Social Networking Statistics Read Saving Money Computer Malfunction Capital Disaster Recovery Taxes Meetings Fake News Downloads Chrome Patching Samsung Upgrades Business Intelligence Gamification Public Cloud Heating/Cooling Hard Drives iPhone Vendor Management Social Microchip News Programming Lithium-ion battery IT Help Desk User Tip Computing Infrastructure Time Management Screen Reader Term Apps Android Trends Employer-Employee Relationship Cost Management Environment Hard Drive Budget Tech Terms IBM Business Continuity Information Twitter Browsers Troubleshooting Inbound Marketing Downtime Domains communications Data Analysis Google Play IT Services Business Owner Google Maps Content Filtering Innovation Smart Tech Touchscreen Securty Competition Facebook Business Cards Streaming Media Network Management Network Remote Computing Electricity Productivity Security Cameras Holiday How To Emails Hacking Proactive IT Mobile Computing Spam VoIP Business Mangement Corporate Profile Pain Points Vulnerability Unified Threat Management Software License Malware Telephone Data Warehousing Business Growth Unified Communications Drones Miscellaneous Word Robot cloud storage Displays Windows XP Quick Tips Project Management Artificial Intelligence Microsoft Vendor Telephone System Notifications Firewall Connected Devices Search cyber security Google Office 365 Equifax Fraud Human Resources Windows Microsoft Excel IT service Shortcut Electronic Payment Customer Service LiFi Risk Management Addiction Maintenance Automation WiFi App Google Docs Small Business Best Practice Physical Security Website Trending Data Regulations Windows 8 Printers Cleaning Mobile Security uptime Fiber-Optic Administrator Computer hardware Bookmark Document Management IT Management Tech Audit Flexibility Start Menu Encryption Printing Safety Collaboration Windows Server 2008 Accountants HIPAA Service Level Agreement Bandwidth IT Support PowerPoint Excel clout services Assessment Antivirus Telephony DDoS IT consulting Processors CIO Music Social Network Best Available eWaste Hard Drive Disposal Printer Emergency Computer Repair Entertainment Windows10 User Webcam Compliance Customer Resource management Employer Employee Relationship Server CCTV Patch Management Application Deep Learning BYOD Information Technology Vulnerabilities Cryptocurrency Software Tablets Value Reliable Computing Workplace Tips Remote Monitoring Specifications IP Address Technology Tips Administration Router Politics Social Media MSP Processing Mobile Device Management Co-Managed IT Managed IT Services Technology Permissions Internet Software as a Service Hackers Legal Comparison SSID Disaster Hacker Windows 7 Knowledge Mobility Machine Learning Error Micrsooft Supercomputer Data Loss UTM Scam Language SharePoint outsource cloud computing Storage Digital Payment Cost Management Best Practices Data Management Scalability Bitcoin Websites Relocation Avoiding Downtime Processor Keyboard Automobile Hosted Solutions Productuvuty Mouse Big data Smartphone Nanotechnology Smartphones Rental Service Startup Bluetooth Update Business Management Mobile Payment Text Messaging Database Paperless Office Vendor Mangement Telephone Systems Network Congestion Navigation Backup and Disaster Recovery Ransomware Browser Hiring/Firing Net Neutrality Entrepreneur the Internet of Things Gaming Console Two-factor Authentication Virtualization Mobile Devices Business Metrics Writing Social Engineering Government Uninterrupted Power Supply Upgrade Gadgets Office Tips Data Backup Tablet Cybersecurity Data Security Proxy Server Hosted Solution PDF Google Drive Apple Enterprise Resource Planning Business Analytics HTML Password Television IT Support Chromebook Wireless Presentation User Error Mobile Device Identity Theft Citrix Xenapp Multi-Factor Security Data storage cloud Desktop Saving Time Computing Migration Redundancy IT Consultant Advertising Backup GDPR Black Market Money Product Reviews Health IT Business Technology Access Username Books Directions Security Memory Managed IT Dark Web Customer Relationship Management Phishing Productivity Laptop Recovery Thank You Alert Outlook Tracking Wireless Technology Network Security Monitoring Fileless Malware Digital Signature Managed Service 3D Printing Cortana Tip of the Week Google Calendar Hacks Tech Support File Sharing Business Computing Upload Marketing Going Green Asset Tracking Electronic Medical Records Messenger Finance Bata Backup Computers Virtual Assistant Congratulations Tactics VoIP Solid State Drive Public Speaking Distribution Worker SaaS Devices Access Control Licensing Settings Company Culture Outsourced IT email scam Wi-Fi Retail Consultation Computer Care Staffing VPN Workers Tech Term Data Protection Distributed Denial of Service Running Cable USB Sports Data Breach WannaCry Phone System Visible Light Communication Operating System Download Botnet Sync Cache Blockchain Unified Threat Management Microsoft Office Users Managed Service Provider Save Time Google Wallet Multi-factor Authentication Internet of Things Banking cloud computing Efficiency Current Events Windows 10 Piracy End of Support switches Virtual Desktop G Suite Regulation Wireless Headphones BDR Travel Conferencing In Internet of Things Applications Healthcare Motion Sickness Private Cloud YouTube Office Fleet Tracking Privacy Windows 10 Computer Accessories Managing Stress Managed IT Service Skype Networking Analytic Data Recovery Digital Cybercrime Device security Monitors Intranet Training Managed IT services IT Plan Web Server Augmented Reality A.I. Documents

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150