Browse Definitions :

“Here, here” or “hear, hear?”

Writing for Business

typing Which is correct?

There were cries of ___________ from board members when the CFO announced that the green computing incentives would also lead to more revenue.
a. “hear, hear”
b. “here, here”

Answer: a.

Explanation: The difficulty with this one, funnily enough, is that people hear it (rather than seeing it in print) and make an assumption about the spelling. Same thing happens with whirlwind (seen as worldwind) and lots of other words. But I digress.

“Hear, hear” is a shortened version of “hear ye, hear ye,” which goes back to British Parliament in the 1600s, if not earlier. The expression was — and is — used to draw attention to what someone is saying. It implies agreement with the speaker or, in modern times, the writer.

More info:
Wikipedia has an entry for hear, hear.

The Straight Dope answers this question:

Dear Straight Dope:

When you agree with someone, do you say “Here Here!” or “Hear Hear” ? And what does it mean? What is the origin of “Here Here” or “Hear Hear”?

The correct term is, “hear, hear!” It is an abbreviation for “hear, all ye good people, hear what this brilliant and eloquent speaker has to say!”

This NY Times article cites a SpellWeb.com statistic:
On the Web, “here here” outpolls the correct “hear hear” 153,000 to 42,000.

Update:
As of today (March 30, 2010) “here here” is still winning (but maybe “hear hear” is gaining?):

here here: 2,720,000
hear hear: 1,420,000

Dig Deeper on Writing for Business

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close