Browse Definitions :

To the manor born or to the manner born?

Writing for Business

Which is correct?
Although she was not __________________, the CEO soon learned to cultivate the soft skills that made her an effective leader.
a. to the manner born
b. to the manor born


Answer: a.

Explanation:
To the manner born comes from Hamlet and means something like accustomed from birth or born with a talent, proclivity or ability. So, our sentence means that although the CEO’s emotional intelligence was lacking, she worked on her people skills and improved.

The phrase is often thought to be to the manor born and is used similarly to another one: born with a silver spoon in his mouth — meaning born into a life of wealth and privilege.

However, to the manner born refers to innate ability (or proclivity or acclimatization) of any sort. As Random House’s Word Maven explains, the original reference is to the ability to drink copious amounts of liquor:

The first thing to note is that this is not some random phrase which we have to puzzle out, but a Literary Allusion, from the WotD’s favorite alludee, Shakespeare. In Hamlet, when the prince is observing the drunkenness common at Elsinore, he complains, “But to my mind–though I am native here,/And to the manner born–it is a custom/More honor’d in the the breach than the observance” (Hamlet I.iv.14ff).

What Hamlet meant here is that he is destined or accustomed from birth to the practice of heavy drinking. The phrase is often used in a sense like this (‘accustomed to (a specified practice) since birth’, that is), or often somewhat more broadly meaning ‘admirably well suited for (something specified)’.

> Read on

So, in fact, you could say a champion yo-yoer, a virtuoso hog-caller or a talented pickpocket from a long line of talented pickpockets was to the manner born. And then, when you got some funny looks, you could explain…

 Follow us on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close