Get Started Today!  321-259-5500

croom new

Tech Term: What are All These “-Wares?”

Tech Term: What are All These “-Wares?”

When you’re talking about something to do with a computer, you’re going to start hearing about some word that ends with “-ware.” You could probably list off a few yourself, but have you ever stopped to think about why they’re all described as “something-ware?” For this week’s Tech Term, we’ll take a peek at why we refer to things that way.

Why ‘Ware?’
It does seem like a strange part of the word, unless you look back to where we get it. According to Wiktionary, Software was first coined as a term in 1953, and was named based upon the fact that the term for the physical elements of the computer were already known as hardware. A quick peek into the online Merriam-Webster dictionary gives us a few definitions for the root of that word, ware.

The ones we’re concerned with are the first and the last definitions in the first entry: “manufactured articles, products of art or craft,” and “an intangible item (such as a service or ability) that is a marketable commodity.” We can combine these to give us a fair representation of what soft-’ware’ means: “manufactured articles to provide a service that is marketable.” After all, what is a computer program, if not an assortment of code meant to complete a specific task desired by a specific audience?

The word was first coined by Paul Niquette in 1953.

Different Software ‘Wares’
As you may imagine, there are plenty of varieties of ‘wares.’ offers a pretty impressive list of software types, with names derived from ‘-ware’, including the ones that you’ve already heard about, and some that are minutely specific. We’ll go over a few of these lesser-known varieties here:

Dreamware - This software type covers those that have not yet begun development and are still in the “what if there was a software that…” phase. Many of these projects never begin development, remaining something that some software developer once dreamt up.

Trialware - This variety of software is that which is only available to the user for a limited period of time, after which it is only available in a restricted form (if at all). This can be considered the free sample of software, offering just enough to make you want more.

Crapware - You know how a new computer often comes pre-installed with programs that you have no interest in, let alone the need for? This is what is known as crapware, as it takes up space without really offering anything to you. Another four-letter synonym for ‘crap’ can also be combined with “-ware” to make another, more forceful term for this variety.

Foistware - Malware can often come bundled with other, more legitimate software titles, to be installed without the user knowing. Of course, other programs can do this as well. Foistware is the term given to these software stowaways.

Fanware - Professionals aren’t the only ones capable of writing code, and even professionals will continue their coding in their off hours. Fanware describes the products that special-interest coders write to promote that interest.

Nagware - Another version of trialware, nagware describes a software title that will interrupt a user with persistent reminders to register it. Nagware will often disable the use of the program for short intervals during use, or display pop-up dialog boxes. In essence, this kind of trialware is designed to coerce a user into purchasing the full version through annoyance.

Garageware - This is a not-so-nice term for software that simply doesn’t perform as it should or has a lot of mistakes. The name is meant to suggest that the creators were total amateurs, developing this program literally in their garage.

Again, this is just a short list of the many different software varieties out there. What other ones have you heard of? Share them in the comments!

Here is How Antivirus Keeps a Business Safe
Your Technology May Fail, but You Can Still Succee...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!


Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Email Hosted Solutions Internet Productivity Computer IT Services Backup Data Network Security Mobile Devices Software Productivity Hardware Microsoft Google Ransomware Managed Service Provider Tech Term User Tips Efficiency Windows 10 Workplace Tips Smartphone Business Continuity Android Innovation Disaster Recovery Small Business Cloud Computing Encryption IT Support Social Media IT Support Business Management Smartphones Data Management Server Data Backup Managed IT Services Network Communication Browser App Outsourced IT Office 365 BYOD Facebook Data Recovery Artificial Intelligence Passwords Paperless Office Employer-Employee Relationship Phishing Apps Upgrade Office Windows Big Data Internet of Things Gmail Hosted Solution Vendor Management Mobile Device Management WiFi Save Money Government Holiday Remote Monitoring Windows 10 Managed IT Services Office Tips Wi-Fi Alert Spam Two-factor Authentication Vulnerability Robot Microsoft Office Risk Management Miscellaneous Firewall Wireless Technology VoIP Collaboration Recovery Wireless Quick Tips Customer Service Infrastructure Work/Life Balance Tip of the week VPN Automation IT solutions Password Content Filtering Bandwidth Word Antivirus Virtualization Budget Saving Money How To Cybersecurity Avoiding Downtime Social Document Management Money IT Management Website Hacker Scam Chrome Computing Healthcare Machine Learning Maintenance Downtime Hard Drives Remote Computing Legal Applications communications Tech Support Business Technology Data storage Virtual Reality Apple The Internet of Things SaaS Unified Threat Management IT service Politics Going Green Mobile Device Tablet Education Twitter Bring Your Own Device Blockchain Analytics Customer Relationship Management BDR Information Managed Service Storage Cybercrime Settings Business Intelligence Google Drive File Sharing Training Access Control HIPAA Monitors G Suite Patch Management Best Practice Point of Sale Computers Search Compliance Telephone Systems Lithium-ion battery Cortana Samsung Taxes Heating/Cooling Data Security Hacking Mobile Security YouTube Business Owner Regulations Management Competition Automobile Users Unified Communications How To Virtual Private Network Private Cloud Server Management Safety User End of Support Presentation Network Management Outlook Solid State Drive eWaste User Error Health Augmented Reality Running Cable LiFi IBM Sports Data loss Virtual Desktop Cost Management Upgrades Websites Printing Operating System Electronic Medical Records Router Computer Care Physical Security Administration Botnet Identity Theft Mouse Chromebook Permissions Enterprise Content Management Test Managed IT Legislation Identity Modem Analyitcs Deep Learning Cache Employees Buisness Hacks Google Maps Law Monitoring iPhone Hiring/Firing Spyware FCC Alt Codes Unsupported Software Supercomputer IP Address Networking Alerts ROI Co-managed IT Save Time Dark Data Emoji Undo Statistics Distributed Denial of Service IoT Favorites Laptop Staffing VoIP Fraud Vulnerabilities Troubleshooting RMM Information Technology Google Docs Help Desk Travel Disaster Comparison Cookies Marketing Electronic Health Records Law Enforcement Recycling Remote Monitoring and Management Trending Backups Personal Information Error 5G SharePoint Gadgets Consulting Public Speaking Title II Halloween Typing Mobile Data Relocation IT Budget Servers Mobile Office Licensing OneNote Notes Web Server Corporate Profile Bluetooth Managed IT Service Star Wars Instant Messaging GPS Time Management Development Tech Terms Google Wallet Motion Sickness Uninterrupted Power Supply Refrigeration Specifications Social Networking Nanotechnology Files Identities Gadget Online Zero-Day Threat Entrepreneur CIO Current Events Computer Repair Downloads IT Technicians Managed Services Provider Writing Notifications IT Consultant Scary Stories Cryptocurrency Digital Payment Techology Cooperation Employee-Employer Relationship PowerPoint Black Market Cameras WannaCry Break Fix Assessment Finance Tracking Lenovo Hotspot Cables Theft Drones Hard Disk Drive Black Friday Screen Reader Read Only Mobile Computing Mail Merge Microsoft Excel Company Culture Human Error Administrator Multi-Factor Security Mirgation Motherboard E-Commerce Knowledge Retail Crowdsourcing Cleaning Firefox Bitcoin Unified Threat Management Staff Remote Workers Professional Services Network Congestion CCTV Dark Web Internet Exlporer Authentication Touchscreen Superfish Language Wires Financial Humor Update Meetings Cyber Monday Smart Tech Printers Address Managing Stress Environment Permission Cabling Application Fun Google Calendar Chatbots Features Experience Social Engineering Windows 8 Printer Wearable Technology Wasting Time Display Processors Digital Shortcut Net Neutrality Hard Drive Authorization 3D Printing Computing Infrastructure Security Cameras Webcam Smart Technology Connectivity Bookmarks Business Growth Domains Regulation Emergency CrashOverride USB Flexibility Database Voice over Internet Protocol

      Latest Blog Entry

      When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encry...

      Account Login