Browse Definitions :

Font of wisdom or fount of wisdom?

Writing for Business

Which is correct?
Once upon a time, the CIO was considered the ____ of all wisdom, at least in terms of technology.
a. fount
b. font

Answer: Either.

Explanation:
Fount is short for fountain as a spring flows from the earth; metaphorically, it refers to a continuous source of something or other. A font, in this context, is more of a reservoir, like the baptismal font. So, although the original expression was “fount of all wisdom,” either works, depending on whether you consider someone to be an eternal source of wisdom or just a sort of holding tank for it. In either case, we often use “fount of all wisdom” sarcastically, implying that they may not be quite as wise as they are deemed to be.

I thought of writing this post because I referred to George Bush as a fount of malapropisms and other errors yesterday in a conversation on Twitter and then wondered about the relationship between the words fount and font.

They both derive from the Latin fons for fountain but came different routes:

From Merriam-Webster:
Fount: Middle English, from Old English, from Late Latin font-, fons, from Latin, fountain
Font: Middle English, from Old English, from Late Latin font-, fons, from Latin, fountain

I’m inclined toward fount, myself, but as Maeve Maddox wrote in her post Fount of Wisdom, “Do you see the figurative source of wisdom or information as a welling spring of water, or as a filled basin? I’ll stick with fount, but I’d hesitate to fault the speaker/writer who goes with font.”

Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close