Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 13 March 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Ransomware Quick Tips Microsoft Cybersecurity Workplace Strategy Small Business Communication Data Backup Passwords Smartphone Saving Money VoIP Backup Android Business Management Smartphones communications Mobile Devices Disaster Recovery Data Recovery Upgrade Managed Service Browser Social Media Managed IT Services Microsoft Office Windows Tech Term Network Internet of Things Remote Current Events Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Productivity Server Managed Service Provider Remote Work Miscellaneous Gadgets Outsourced IT Information Holiday Encryption AI Employee/Employer Relationship Spam Windows 10 Office Business Continuity Compliance Government Data Management Training Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Business Technology Mobile Office Data Security Two-factor Authentication Apps Managed Services Budget Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail Vendor Employer-Employee Relationship Chrome Conferencing Hacker Avoiding Downtime Marketing How To BDR BYOD Computing WiFi Applications Information Technology Access Control Office 365 Tip of the week Computers Retail Storage Password Healthcare Bring Your Own Device Website Managed IT Services Operating System HIPAA Router Virtual Private Network Big Data Risk Management Health Help Desk Office Tips Analytics Augmented Reality Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime The Internet of Things Display Social Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA IT Support Excel Customer Service Document Management Presentation Managed IT Service Maintenance Antivirus Wireless Technology Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Word Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering Safety IT Management VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Customer Relationship Management Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Hacking Humor Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes User Fun Co-managed IT Technology Care Twitter Alerts SQL Server Deep Learning Download Net Neutrality Financial Data Error History Business Communications Browsers Smartwatch IP Address Education Connectivity IT Social Engineering Break Fix Scams Hybrid Work Remote Computing Azure Upload Procurement Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Recovery Search Dark Web Cables Hard Drives Alert Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Domains Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Refrigeration Business Intelligence Notifications Staff Value Organization Public Speaking Travel Social Networking Legislation Shortcuts Ransmoware Cortana Techology Fileless Malware Digital Security Cameras Lithium-ion battery Google Maps Smart Devices Alt Codes Content Remote Working Vendors Wearable Technology Memory Entrepreneur Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Workforce Permissions Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Undo Threats Wasting Time Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Meta Knowledge Fraud Google Drive User Error Microchip Internet Exlporer Software as a Service Username Amazon Managing Costs Point of Sale eCommerce 5G Black Friday SSID Outsource IT Experience Virtual Assistant Google Docs Unified Communications Database Surveillance Application Bitcoin Network Management Environment Running Cable Tech Support IT Technicians Virtual Machine Media Google Wallet Proxy Server Reviews IBM Cookies Monitors Cyber Monday Medical IT Small Businesses Hotspot Transportation Tactics Development Windows 8 Displays Laptop Websites Mirgation Hypervisor Drones Shopping Nanotechnology Optimization PowerPoint Outsourcing Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Management PCI DSS Competition Halloween Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Service Level Agreement Internet Service Provider

Blog Archive