ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 13 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 IT Support Browser Apps Managed Service Cloud Computing Outsourced IT Miscellaneous Remote Work Internet of Things Managed Service Provider Data Management Saving Money Government Operating System Workplace Strategy Gadgets Networking Artificial Intelligence Windows Managed IT services Blockchain Spam Business Technology Mobile Device Management WiFi Information Remote Bandwidth Encryption Server App Virtualization Two-factor Authentication Office 365 Budget Employee/Employer Relationship Apple Information Technology Gmail Office History Health Wi-Fi BDR Analytics Conferencing Cybercrime Access Control Data Security Big Data Save Money Remote Monitoring Remote Computing Hacker IT Management Training Cost Management Compliance Vendor Document Management Help Desk Voice over Internet Protocol Patch Management Hacking Employer-Employee Relationship Retail Managed Services Alert Project Management Data loss Hiring/Firing Outlook BYOD Money Password Computing Customer Service Unified Threat Management Vendor Management Firewall Hard Drive Applications Augmented Reality Word IBM Vulnerabilities Website Legal Search... Best Practice Data storage Mobile Office Travel Maintenance Free Resource Virtual Reality Social Engineering Cryptocurrency Laptop How To Black Market User Cleaning Websites Robot Mobility Meetings Social Sports DDoS Chrome Google Maps SaaS Scam Data Breach Windows 11 iPhone Education Cortana Twitter VPN Mobile Computing Content Filtering Update Law Enforcement Marketing End of Support Monitoring Printer Running Cable Router Healthcare Remote Workers Storage Paperless Office The Internet of Things Antivirus YouTube Windows 7 Bluetooth Virtual Private Network Physical Security Distributed Denial of Service Telephone Office Tips Wireless Technology Private Cloud eWaste Memory Current Events Start Menu Excel Solutions HIPAA Downloads Computer Care Downtime Safety Images 101 Integration Politics Vulnerability Machine Learning Settings Display Software as a Service Virtual Desktop Data Protection Virtual Assistant Experience Solid State Drive Employees Avoiding Downtime Holidays Chromebook Drones Disaster Processor PowerPoint Automobile Administration Cooperation Tech Terms Video Conferencing Presentation How To Specifications Lithium-ion battery Virtual Machines IT Consultant Microchip Managed IT Digital Computer Repair Flexibility Multi-factor Authentication Processors Professional Services Customer Relationship Management Co-Managed IT Taxes Hack Entertainment Identity Theft Saving Time Notifications Unified Communications Managed Services Provider Bitcoin Computers Google Docs Download Google Apps Cache Piracy Public Speaking Term Shortcuts Unified Threat Management HTML Music Telework Workers Streaming Media Smartwatch Communitications Microsoft 365 Keyboard Browsers Nanotechnology Troubleshooting Printing Upload Software License Procurement CCTV Hard Drives Google Play Botnet intranet Be Proactive Social Network Touchscreen FinTech Micrsooft CES IT Assessment Computer Malfunction Wireless Shortcut Data Analysis Rental Service Emergency Screen Reader Security Cameras Environment Trends Flash Vendor Mangement Mobile Technology Supply Chain Management Value Heating/Cooling Cyber security Social Networking Workplace Strategies Customer Resource management Telephone Systems Devices Business Growth Organization Samsung Windows XP Uninterrupted Power Supply Tip of the week Smart Devices Webcam Fileless Malware Business Owner Gamification Business Mangement Company Culture Remote Working Trend Micro Telephone System Banking Regulations Google Wallet AI Tablets Backup and Disaster Recovery Deep Learning Digital Security Cameras Electronic Health Records Transportation Directions Messenger Google Calendar Content Desktop Supercomputer Wasting Time eCommerce Modem Smart Technology Electronic Medical Records Business Metrics Virus Accountants Hosted Solution Database Videos Surveillance Motion Sickness Staffing Books Inbound Marketing Comparison Language Google Drive Society Managing Costs IP Address SSID Health IT Equifax Tactics Monitors Media Corporate Profile Hard Drive Disposal Visible Light Communication Development Employer/Employee Relationships Reading Knowledge Television Username Telephony Windows 8 Employer Employee Relationship Virtual Machine Freedom of Information Optimization Electronic Payment Supply Chain Startup Reviews Cabling Addiction Displays 2FA Tablet email scam Advertising G Suite Recovery Teamwork Competition Navigation Relocation Mouse Work/Life Balance VoIP Mobile Security Tech Support Data Storage Tracking Hypervisor LiFi News Medical IT Entrepreneur Workplace User Tip Phone System Legislation Shopping Network Management Paperless Web Server Documents SQL Server Application Evernote In Internet of Things Business Intelligence SharePoint PCI DSS Digital Payment Licensing Worker Fake News Humor Scams Proxy Server Hacks Emails Network Congestion Gig Economy Service Level Agreement Writing Business Communications Access Computing Infrastructure Internet Service Provider Securty Azure Reliable Computing Domains Management Computer Accessories Time Management Device security Regulations Compliance Public Cloud Managed IT Service Microsoft Excel Memes Cables Wireless Headphones Audit Going Green Human Resources Spyware Business Cards Net Neutrality Tech Scalability Administrator Error Text Messaging Proactive IT Financial Data File Sharing IT Point of Sale Bookmark Bring Your Own Device Redundancy Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?