Browse Definitions :

“Here, here” or “hear, hear?”

Writing for Business

typing Which is correct?

There were cries of ___________ from board members when the CFO announced that the green computing incentives would also lead to more revenue.
a. “hear, hear”
b. “here, here”

Answer: a.

Explanation: The difficulty with this one, funnily enough, is that people hear it (rather than seeing it in print) and make an assumption about the spelling. Same thing happens with whirlwind (seen as worldwind) and lots of other words. But I digress.

“Hear, hear” is a shortened version of “hear ye, hear ye,” which goes back to British Parliament in the 1600s, if not earlier. The expression was — and is — used to draw attention to what someone is saying. It implies agreement with the speaker or, in modern times, the writer.

More info:
Wikipedia has an entry for hear, hear.

The Straight Dope answers this question:

Dear Straight Dope:

When you agree with someone, do you say “Here Here!” or “Hear Hear” ? And what does it mean? What is the origin of “Here Here” or “Hear Hear”?

The correct term is, “hear, hear!” It is an abbreviation for “hear, all ye good people, hear what this brilliant and eloquent speaker has to say!”

This NY Times article cites a SpellWeb.com statistic:
On the Web, “here here” outpolls the correct “hear hear” 153,000 to 42,000.

Update:
As of today (March 30, 2010) “here here” is still winning (but maybe “hear hear” is gaining?):

here here: 2,720,000
hear hear: 1,420,000

Dig Deeper on Writing for Business

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close