Feeds

Mind the Gap Saturday: Forums East and West

Part two: Are you GG or PPMM?

Top 5 reasons to deploy VMware with Tegile

Mind the Gap Saturday is a feature every Saturday where Blognation China tells its readership the differences - the gap - in the tech, mobile and enterprise worlds between China and the Western world.

We continue our journey through the Chinese forum world, diving deep this time into a few phrases you might encounter on your travels on Chinese forums. Meet the netizens in person and sample great food at fubai events. Mind the majias and out-of-hand ZTs. And yes, we hope to make this a non-orz post.

Which floor are you on?

If you're asked which floor you're on in a forum on the Chinese internet, you'd be more than confused - especially if this is your first visit.

Fear not: most Chinese forums work like a skyscraper - albeit inverted (floors with higher numbers appearing below the first floor). The first floor is always the original post. The first reply (that's post number two) is always floor two. You can pretty much tell which post a fellow "topic resident" is talking about by taking a look at the post number, or adding one to the "floor-in-question" in terms of the reply.

So if you're told to check out the post "on the ninth floor", this would be the ninth message in the thread, or the eighth reply to the original post.

Floors are symbolised by the Chinese characters lou (楼) or ceng (层). They sometimes use it with the prefix di (第), thus making floor five wu lou (5 楼) or di wu ceng (第 5 层).

The first poster, by the way, is always the initiator of the post - and is known as the LZ, or lou zhu (楼主), as in the "owner of the floors". If you see LS (lou shang or "楼上" in characters), that refers to the post immediately before this present post (with the LS remark).

Culinary corruption: The essence of fubai

China is one big nation for delicacies - and the internet world in the PRC is absolutely cooking with great food. We refer, of course, to the world of fubai (腐败), or corruption - a la cuisine.

So how do we link cuisine to corruption? Word has it that those in power more often than not spend entire Everest-loads of cash just on food instead of doing something more decent or job-related. Since this appears to be corrupt practise, the netizenry has equated official corruption to what they do best - munching away on the food.

If you're witness to a post regarding a possible fubai, more often than not, it's an invite to a social - either a KTV-a-thon, an outing, or indeed - a food bash. Just ding away with your name and contact details, find out where the fubai's taking place, and socialise with the forum people - the real people. Fubais often can be social and very rewarding for those part of the event, but be sure to RSVP ahead of time.

Fubais are relatively popular among the Chinese internet world - and that's no surprise to a nation immersed in the best food on the planet.

Internet Security Threat Report 2014

Next page: Lead me, LD!

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.