Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Get the Technology Your Company Requires
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Start Menu Virtual Desktop Regulations Software as a Service Google Calendar Thank You HTML Two-factor Authentication Malware Data Loss How To Managed Service Google Docs Patch Management Environment Skype Bitcoin Smartphones Redundancy Backup Connected Devices Medical IT Cost Education Retail Mobile Payment Professional Services Managed IT Service Cooperation Disaster switches Efficiency Solutions YouTube Mobile Device Vulnerability Data Warehousing Processors Artificial Intelligence Fake News Statistics History Augmented Reality Automation Data Protection Risk Management Saving Money Wireless Meetings Regulation Windows 8 Saving Time Downtime clout services Business Owner Alert Software Application Public Speaking Touchscreen Antivirus Computer Best Practice Scam Hacker Cost Management Fiber-Optic SaaS Rental Service Users Politics Wireless Technology Device security Data storage Freedom of Information Content Filtering Proxy Server Citrix Xenapp Botnet Managed Service Provider Gamification Shortcut Multi-factor Authentication Uninterrupted Power Supply Scalability PDF Travel Public Cloud Money Telephone System Windows XP Tech Term Tip of the week Pain Points User Error IT Plan Automobile Upgrade Language Licensing VoIP Telephone File Sharing Text Messaging Tech Terms 3D Printing Programming Workplace Tips Cryptocurrency Software License Social Networking G Suite Healthcare Securty Innovation News Printers Settings Data Recovery Identity Theft Multi-Factor Security GDPR Managed IT Services Devices Capital Hackers Internet Wi-Fi Office Tips Search Asset Tracking Productivity Fleet Tracking Corporate Profile Read Backup and Disaster Recovery outsource cloud storage Writing Data Management Cybercrime Mobile Devices Relocation Document Management Proactive IT Competition Patching Enterprise Resource Planning Advertising PowerPoint Microsoft Law Enforcement Security Cameras Service Level Agreement Unified Communications Rapid City Knowledge Screen Reader Chamber Sports Printer IT Services Productuvuty Network Budget Spam Television Blockchain Human Resources Internet of Things Administrator Hacks Taxes Employer-Employee Relationship Windows 7 Update Microchip Business Mangement Applications Upgrades Startup cloud Data Analysis Nanotechnology Presentation Reading Troubleshooting Printing Phishing Networking Accountants Permissions Digital Payment Google Drive MSP Machine Learning User Tip IT consulting cloud storage Motion Sickness IT Consultant Business Cards Health Best Available Mouse Cache Office WannaCry Privacy Mobility Apple Data cloud computing Avoiding Downtime Electronic Payment Technology Tips Ransomware Current Events Smartphone cyber security Social Network Work/Life Balance Browsers Conferencing Training Flexibility Supercomputer Holiday Computer Accessories Company Culture Telephone Systems Network Congestion Desktop Physical Security Help Desk Gadgets Inbound Marketing Customer Service Bring Your Own Device Unified Threat Management Hosted Solution Society Hack Directions Entrepreneur Microsoft Excel Data Backup UTM Vendor Specifications Mobile Technology Gmail Project Management Co-Managed IT Small Business Save Time Technology Tablet Email Streaming Media Cortana Cybersecurity Data Security Micrsooft Network Management Trending Finance Vulnerabilities Business Intelligence SSID Word Entertainment Evernote CCTV Cabling Audit Employer Employee Relationship Chromebook Solid State Drive Distribution Comparison Passwords Health IT Gaming Console Computing Infrastructure email scam Social Engineering Windows 10 Bluetooth Processing hardware Legal Webcam Save Money Fraud Processor Virtual Assistant Logistics Tech Bookmark Intranet Recovery Mobile Security Spyware DDoS Teamwork Lithium-ion battery Social Google Play Browser Tactics Distributed Denial of Service Documents Banking Memory Net Neutrality IP Address Congratulations Windows 10 Paperless Office Miscellaneous Safety Digital BYOD Download Error User Experience Database Network Security Integration Unified Threat Management Business Technology Virus Username Windows Server 2008 Private Cloud Marketing CIO CrashOverride Windows Maintenance End of Support Black Market Going Green Heating/Cooling Quick Tips VoIP Samsung Assessment Fileless Malware Time Management IT Management Tech Support Messenger Wireless Headphones Vendor Management In Internet of Things IT service Business Metrics Telephony Data Breach BDR Smart Tech Business Computing Outlook A.I. Flash Vendor Mangement Monitoring Customer Relationship Management Sync Office 365 Books communications Websites Mobile Computing Google Maps Voice over Internet Protocol Tablets Managing Stress Business Computing Bata Backup Operating System Running Cable Compliance Access Control SharePoint Downloads Computer Repair Router IT Support Security Domains Management Consultation Keyboard Robot Deep Learning Workers Password Term Digital Signature Google Google Wallet Drones Remote Computing Storage Laptop WiFi App Government Windows10 Big data Piracy Microsoft 365 Firewall Computers Computer Care Legislation Value Android Information Technology Equifax LiFi Microsoft Office Electronic Medical Records Server Web Server Upload Hard Drives USB Twitter Music the Internet of Things Chrome Staffing Visible Light Communication Analytic Worker outsource cloud computing VPN Hacking eWaste Best Practices Addiction Product Reviews Business Continuity Cleaning Hosted Solutions iPhone Communication Apps Hard Drive IT Facebook Virtual Reality Migration Mobile Device Management Analytics Social Media Remote Monitoring Information Encryption Tip of the Week Productivity Monitors Managed IT services Customer Resource management uptime IT Support Navigation Website Tracking Collaboration Business Growth Phone System Electricity Computer Malfunction HIPAA Disaster Recovery Business Management Outsourced IT Access Administration Trends Emails Content Hiring/Firing Dark Web Managed IT Displays Notifications Excel Emergency Bandwidth IBM Reliable Computing Hard Drive Disposal Modem Virtualization User Tips

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150