Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

Other Options for Visual Excel Data
Information Technology: How to Handle the Inevitab...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Business Computing Tech Term Hackers Productivity Data Backup Software IT Support Data Efficiency Innovation Android Data Recovery Business Management Malware User Tips Google Communications Collaboration Cybersecurity Computer Internet Email Smartphone Small Business IT Services Backup Windows 10 Cloud Phishing Communication Hosted Solutions Mobile Device Managed IT Services Ransomware Browser Business Technology Facebook VoIp Social Media Microsoft Office Hardware BDR Artificial Intelligence Access Control Office 365 Managed Service Mobile Devices Cybercrime Mobile Device Management Cost Management Information IT Management Business App Outsourced IT Applications Blockchain Automation Cloud Computing Apps Two-factor Authentication Encryption Websites Gadgets Server Network Holiday Data Security Data Management Patch Management Managed IT Services Scam Hard Drive Workplace Tips Saving Money Disaster Recovery Update Antivirus Smartphones Maintenance Microsoft Passwords Internet of Things Start Menu Managed Service Provider Laptop Conferencing Google Maps Healthcare Document Management Data loss Hacking Apple Analytics Users SaaS Vendor VPN Vulnerability Business Continuity Data Breach Bitcoin Vulnerabilities Augmented Reality Money Operating System Mobility Save Money Social Engineering Search Spam Alert Big Data Bandwidth Word Quick Tips Touchscreen Digital Tech Terms Data Protection Remote Monitoring Gmail Cooperation Project Management Saving Time Printer Windows Law Enforcement User Tip Company Culture Access Evernote Accountants History VoIP Google Calendar Medical IT Cleaning Settings SharePoint Content Fileless Malware HTML Business Mangement Legal Electronic Medical Records iPhone Automobile Specifications Download Bookmark Paperless Office WiFi Tip of the week Error Social Business Cards Virtualization Addiction Identity Theft Running Cable Spyware Microsoft Excel Miscellaneous eWaste Training IBM Outlook Telephone Systems Health IT PowerPoint Information Technology Computers Administration IT Support Disaster Distributed Denial of Service BYOD Directions Virtual Assistant Solid State Drive Best Practice Downloads Emergency Television Upload Browsers Multi-factor Authentication Database Wireless Telephone Router Tablet Software as a Service Machine Learning Proxy Server Desktop Cabling Chromebook Cryptocurrency Tech Robot Equifax Corporate Profile Time Management Consultant Google Docs Professional Services Mobile Technology Employer-Employee Relationship Nanotechnology Freedom of Information Microchip Devices Unsupported Software Mouse Trends Device security Tactics Password Unified Communications Cortana Social Network Modem Downtime Emails How to Redundancy Budget Network Management Help Desk Backup and Disaster Recovery Audit Monitoring Term Startup Sports Knowledge News Travel Processor Hard Drive Disposal Compliance Uninterrupted Power Supply Google Drive Virus DDoS Gamification Entertainment Website Printing Customer Resource management SSID Piracy Bluetooth Service Level Agreement Vendor Management Worker Twitter Management Google Play Computing Infrastructure Unified Threat Management Virtual Reality Screen Reader Samsung Fake News Username Navigation email scam Regulations Telephony Managed IT Upgrades Software License Wireless Headphones YouTube Data Analysis Vendor Mangement Unified Threat Management Government Telephone System Comparison Going Green Mobile Security Computer Care Excel Computing Security Cameras Networking Legislation Voice over Internet Protocol Windows 10 Marketing Printers Office Retail Regulation CrashOverride Office Tips Multi-Factor Security Managing Stress

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.