Feeds

China runs out of surnames

93 million Wangs and rising

Seven Steps to Software Security

China has been forced to mull the possibility of allowing double-barrelled surnames - a break with the ancient tradition that citizens adopt one of a hundred single character surnames.

The majority of Chinese take their surnames from the list, considered "part of the country's cultural heritage", the Telegraph explains. So embedded is this tradition that "ordinary" Chinese people are referred to as laobaixing, or "old hundred names", and schoolkids have to learn the lot by heart.

In fact, other less common surnames bring the official total of permitted surnames to 161, but this doesn't do much to offset the fact that there are now 93 million Wangs in China - closely followed by 92 million Lis - something which is causing the authorities a bit of a problem.

One official explained that "there are so many people who share an identity that it is becoming confusing", while Beijing police household registration officer Guan Xihua offered: "Such names cause great trouble in daily life." Indeed, China Daily notes that the name Wang Tao is shared by no less than 100,000 people.

The solution is, the powers that be reckon, to allow double-barrelled combinations. China Daily gives the example of a baby whose dad's surname was Zhou, the mother's Zhu, and who could therefore be called Zhou, Zhu, Zhouzhu or Zhuzhou.

Another proposal to expand the surname roster is "lifting restrictions on what counts as a surname to allow a greater variety of characters, including from ethnic minority languages where currently the closest sounding Chinese surname is commonly used".

However, parents will still not be able to use the "unsimplified, old-fashioned characters still used in Taiwan and Hong Kong" or Chinglish surnames. Furthermore, the western alphabet is strictly off-limits, meaning no Fleur de Lis or Brooklyn Zhous in the foreseeable future. ®

Bootnote

The top ten Chinese surnames are: Wang, Li, Zhang, Liu, Chen, Yang, Huang, Zhao, Zhou, Wu.

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.