Feeds

China runs out of surnames

93 million Wangs and rising

Internet Security Threat Report 2014

China has been forced to mull the possibility of allowing double-barrelled surnames - a break with the ancient tradition that citizens adopt one of a hundred single character surnames.

The majority of Chinese take their surnames from the list, considered "part of the country's cultural heritage", the Telegraph explains. So embedded is this tradition that "ordinary" Chinese people are referred to as laobaixing, or "old hundred names", and schoolkids have to learn the lot by heart.

In fact, other less common surnames bring the official total of permitted surnames to 161, but this doesn't do much to offset the fact that there are now 93 million Wangs in China - closely followed by 92 million Lis - something which is causing the authorities a bit of a problem.

One official explained that "there are so many people who share an identity that it is becoming confusing", while Beijing police household registration officer Guan Xihua offered: "Such names cause great trouble in daily life." Indeed, China Daily notes that the name Wang Tao is shared by no less than 100,000 people.

The solution is, the powers that be reckon, to allow double-barrelled combinations. China Daily gives the example of a baby whose dad's surname was Zhou, the mother's Zhu, and who could therefore be called Zhou, Zhu, Zhouzhu or Zhuzhou.

Another proposal to expand the surname roster is "lifting restrictions on what counts as a surname to allow a greater variety of characters, including from ethnic minority languages where currently the closest sounding Chinese surname is commonly used".

However, parents will still not be able to use the "unsimplified, old-fashioned characters still used in Taiwan and Hong Kong" or Chinglish surnames. Furthermore, the western alphabet is strictly off-limits, meaning no Fleur de Lis or Brooklyn Zhous in the foreseeable future. ®

Bootnote

The top ten Chinese surnames are: Wang, Li, Zhang, Liu, Chen, Yang, Huang, Zhao, Zhou, Wu.

Intelligent flash storage arrays

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.