Get Started Today!  321-259-5500

croom new

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Here is How Antivirus Keeps a Business Safe
Your Technology May Fail, but You Can Still Succee...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!


Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email IT Services Productivity Data Network Security Productivity Computer Backup Mobile Devices Hardware Microsoft Software Ransomware Google Managed Service Provider Workplace Tips User Tips Efficiency Tech Term Windows 10 Android Smartphone Innovation Business Continuity Server Disaster Recovery Small Business Cloud Computing Communication Business Management Smartphones Upgrade IT Support Data Management Encryption Social Media IT Support Data Backup Phishing Managed IT Services Browser App Network Outsourced IT Windows 10 Paperless Office BYOD Office 365 Facebook Windows Artificial Intelligence Data Recovery Collaboration Apps Big Data Passwords Employer-Employee Relationship Gmail Office Internet of Things WiFi Microsoft Office Managed IT Services Holiday Vendor Management Mobile Device Management VoIP Save Money Remote Monitoring Hosted Solution Government Miscellaneous Two-factor Authentication communications Alert Vulnerability Virtualization Robot Spam Risk Management Firewall Wireless Technology Recovery Wireless Cybersecurity Chrome Office Tips Saving Money Wi-Fi VPN Social IT Management Work/Life Balance Infrastructure Password Quick Tips IT solutions Word Content Filtering Managed Service Tip of the week Business Technology Automation Budget Bandwidth Avoiding Downtime Antivirus Analytics Money Website How To Hacker Customer Service Settings Mobile Device Scam Document Management Hard Drives Storage Legal Downtime BDR Remote Computing File Sharing Tech Support The Internet of Things Applications Cybercrime Machine Learning Information Maintenance Compliance Healthcare Data storage Virtual Reality Going Green Education Apple Customer Relationship Management Bring Your Own Device SaaS Politics Unified Threat Management Twitter Blockchain IT service Computing Tablet Computer Care Physical Security Search Chromebook Access Control HIPAA Botnet Patch Management Cortana Networking Heating/Cooling Identity Theft Google Drive Router Monitors Training G Suite YouTube Presentation Unified Communications Data Security Point of Sale Safety Mobile Security Samsung IBM Solid State Drive Taxes Augmented Reality Virtual Private Network Telephone Systems LiFi Cooperation Regulations User Error Gadgets Lithium-ion battery Virtual Desktop Sports Cost Management End of Support Hacking How To Private Cloud Automobile Outlook Business Owner Printing Server Management Administration Users Competition Network Management Health User Business Intelligence Management Mouse Data loss Upgrades Websites Net Neutrality Computers Running Cable Best Practice eWaste Operating System Electronic Medical Records Motherboard E-Commerce Cabling Display Processors Laptop Alt Codes Legislation Identity Company Culture Human Error Co-managed IT Save Time Permissions Public Speaking Internet Exlporer Authentication Digital 3D Printing 5G Information Technology FCC Remote Workers Professional Services Alerts Smart Tech Webcam Printers Mobile Office Trending Statistics Distributed Denial of Service Shared resources Wires Environment Financial Managed IT Fraud Features Halloween Typing Comparison Database Managing Stress Permission Refrigeration Dark Data Emoji Identities SharePoint Hard Drive Authorization Spyware Unsupported Software Google Wallet Title II Google Maps Wasting Time Help Desk Licensing Connectivity Bookmarks Analyitcs Law Enforcement CIO Current Events Bluetooth Managed IT Service OneDrive Supercomputer Security Cameras Google Docs Modem Travel iPhone Disaster Scary Stories Cryptocurrency Specifications Social Networking Voice over Internet Protocol Enterprise Content Management Staffing Test VoIP Backups Personal Information Mobile Computing Downloads IT Technicians Cache Employees Mobile Data Relocation Drones Online Error Monitoring Knowledge Techology IoT Marketing Web Server Favorites Corporate Profile Gadget Break Fix Manufacturing Troubleshooting IT Budget ROI Servers Lenovo Hotspot Cookies Motion Sickness Electronic Health Records Uninterrupted Power Supply Writing Notifications Bitcoin Black Friday Windows 7 Vulnerabilities GPS RMM Time Management Computer Repair Black Market Multi-Factor Security Mirgation Recycling IT Consultant Remote Monitoring and Management Application Fun Mail Merge Microsoft Excel Consulting Experience Unified Threat Management Staff Star Wars Cameras Instant Messaging WannaCry Dark Web Hard Disk Drives OneNote Digital Payment Notes Superfish Language Nanotechnology Files Hard Disk Drive Retail Crowdsourcing Windows 8 Cyber Monday Development Tracking Tech Terms Entrepreneur Managed Services Provider Network Congestion Business Growth Google Calendar Chatbots Cleaning Zero-Day Threat Firefox Address Administrator Humor Update Deep Learning Printer Wearable Technology Assessment CCTV Finance Law Shortcut Solid State Drives Employee-Employer Relationship PowerPoint Undo Hiring/Firing Computing Infrastructure Screen Reader Meetings Read Only Social Engineering IP Address Buisness Hacks Smart Technology Teamwork Cables Theft Touchscreen Wireless Internet Emergency USB CrashOverride Regulation Flexibility Students Domains

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login