Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Understanding Different “____wares”

Technology Basics: Understanding Different “____wares”

Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into the basics of what we mean when we’re talking about “-ware.”

Defining ‘Ware’
Based on Wiktionary’s entry on software, the term was coined by Paul Niquette in 1953 and intentionally plays off the fact that the physical components of a device are (and were) referred to as hardware.

Turning to the online edition of the Merriam-Webster dictionary, we can take a deep dive into the actual root word, ware, more directly.

Taking the first and last of the provided definitions, we can more or less combine them into a workable statement for our case. “Manufactured articles, products of art or craft” and “an intangible item (such as a service or ability) that is a marketable commodity” can be combined to sum up ‘ware’ as it would apply in ‘software’: “manufactured articles to provide a marketable service.” Software is simply a program, developed to allow people with a specific need to fulfill that need.

Different Soft-‘Wares’
As Wiktionary demonstrates in its list of softwares, there is a considerable list of words that play off our determined definition. We’ll review some of the lesser-known ones:

Crapware - This descriptive term (although not as descriptive as the other name for these programs, which uses another four-letter-word for “crap”) describes all the programs that a computer comes pre-loaded with, despite the user having no want or need of them.

Dreamware - Those softwares that haven’t yet been - and may never be - created are referred to as dreamware, as they are still in the stage where they are just something that a developer dreamt up.

Fanware - Some developers continue their coding outside of the professional realm, and many amateurs are very accomplished. These individuals often write code for the benefit of their personal interests, known as fanware.

Foistware - Just like some malware is, many software titles can come bundled together with more desired software and installed alongside it. These titles have been given the name foistware.

Garageware - Despite many of the most famous and successful technologists of our time starting more or less in their garage, this is a derisive term that professionals often use to describe software that doesn’t quite work right or is riddled with errors. The implication is that it was created by total amateurs (you guessed it) in their garage.

Nagware - This is an offshoot of the next software variety, specifically including those programs that interrupt the user with a reminder to register the title. Whether it’s repeated pop-up boxes appearing during use, or even disabling the program for a brief time during use, this kind of software attempts to annoy the user into purchasing the “full” or “premium” version of the program in question.

Trialware - Many software developers, recognizing the effectiveness of a free sample among an audience, will release a limited form of their software to users for no charge. These samples are often confined by a time limit, and many offer just enough functionality to prove its worth enough to entice the user.

There are, again, many more varieties of software that could be added to this list. What other ones have you come across? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 18 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Microsoft Cybersecurity Passwords Backup Communication Saving Money Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Mobile Devices communications Upgrade Data Recovery Disaster Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services Current Events AI Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Holiday Miscellaneous Information Remote Work Training Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology IT Support Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Chrome Managed Services Mobile Device Management Voice over Internet Protocol Budget Gmail How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Conferencing Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Cooperation Free Resource The Internet of Things Project Management Windows 7 Social Going Green Patch Management Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Cybercrime Physical Security Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Safety Vulnerabilities Administration Entertainment Data Privacy Images 101 Telephone System Robot Multi-Factor Authentication Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Employees Integration Cryptocurrency Hacking User Tip Modem Mobile Security Presentation Processor Computer Repair Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Word Managed IT Service Maintenance Sports Downloads Antivirus iPhone Mouse Licensing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Mobile Computing Dark Web Cables Tablet Undo CES Search IoT Communitications Trends Supply Chain Management Best Practice Alert Buisness File Sharing Customer Resource management FinTech Dark Data Regulations Google Calendar Term Google Apps Managed IT Microsoft Excel IT Maintenance Legal IT solutions Data Analysis How To Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Business Growth Notifications Travel Application Organization Social Networking Legislation Shortcuts Ransmoware Techology Google Maps Fileless Malware Digital Security Cameras Cortana Smart Devices Content Remote Working Wearable Technology Memory Vendors Alt Codes IBM Downtime Unified Threat Management Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Hosted Solution Directions Videos Assessment Electronic Health Records Wasting Time Threats Typing Network Congestion Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Google Drive User Error Competition Microchip Knowledge Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale 5G eCommerce Black Friday SSID Virtual Assistant Outsource IT Google Docs Unified Communications Experience Database Surveillance Running Cable Tech Support User IT Technicians Virtual Machine Environment Media Bitcoin Network Management Google Wallet Proxy Server Reviews Monitors Cookies Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Laptop Websites Mirgation Hypervisor Displays Windows 8 IP Address PowerPoint Drones Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing SharePoint Electronic Medical Records Halloween Recovery Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Lenovo Hard Drives Gig Economy Writing Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Domains Virtual Reality Scary Stories Private Cloud Regulations Compliance Identity Evernote Paperless Hacks Server Management Co-managed IT Superfish Identity Theft Refrigeration Bookmark Fun Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Deep Learning Public Speaking Twitter Error Financial Data History Business Communications Lithium-ion battery Break Fix Scams Education Browsers Smartwatch Social Engineering Entrepreneur Connectivity IT Upload Procurement Azure Hybrid Work Remote Computing

Blog Archive