Browse Definitions :

A homage or an homage?

Writing for Business

Which is correct?
The monument, built to resemble a giant iPhone, was created as _______ to Steve Jobs.
a. an homage
b. a homage


Answer: Either, depending on how you pronounce “homage.”

Explanation:

I pronounce it ohm-ahj, and seeing it spelled as “a homage” makes me hear it in hillbilly. But that’s just me, and I do not rule the Internets.

The New York Times doesn’t either, but they certainly come much closer to global dominance than I do, so let’s see what Ben Zimmer (@bgzimmer) has to say:

The New York Times style guide does not specifically address the word homage, and in such matters the copy desk typically turns to Webster’s New World Dictionary for guidance. As with other leading American dictionaries, Webster’s New World currently recognizes two equally accepted pronunciations of the word: either HOM-ij or OM-ij. Since the pronunciation with “h” is listed first, that would favor “a homage” over “an homage.” (The Times has not been terribly consistent on this score, however. Since 2001, “a homage” has appeared in the paper 500 times, but “an homage” has appeared 407 times.) > Read more

OK. No help there.

The Grammarphobia Blog reports on the increasingly common use of the French spelling, hommage, which would always take “an” as the article because there’s no question about its pronunciation. On the other hand, it may be seen as an affectation beyond that of just pronouncing it in the French manner.  So we’re left with “make your choice and take your chances.”

Let’s try a Google poll:

An homage: 1,680,000

A homage: 978,000

Google poll results fairly decisive – maybe I do rule the Internets, after all. All right then — let’s stick with “an homage,” kids.

Dig Deeper on Writing for Business

SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close