Feeds

Mind the Gap Saturday: Forums East and West

Part two: Are you GG or PPMM?

The essential guide to IT transformation

Mind the Gap Saturday is a feature every Saturday where Blognation China tells its readership the differences - the gap - in the tech, mobile and enterprise worlds between China and the Western world.

We continue our journey through the Chinese forum world, diving deep this time into a few phrases you might encounter on your travels on Chinese forums. Meet the netizens in person and sample great food at fubai events. Mind the majias and out-of-hand ZTs. And yes, we hope to make this a non-orz post.

Which floor are you on?

If you're asked which floor you're on in a forum on the Chinese internet, you'd be more than confused - especially if this is your first visit.

Fear not: most Chinese forums work like a skyscraper - albeit inverted (floors with higher numbers appearing below the first floor). The first floor is always the original post. The first reply (that's post number two) is always floor two. You can pretty much tell which post a fellow "topic resident" is talking about by taking a look at the post number, or adding one to the "floor-in-question" in terms of the reply.

So if you're told to check out the post "on the ninth floor", this would be the ninth message in the thread, or the eighth reply to the original post.

Floors are symbolised by the Chinese characters lou (楼) or ceng (层). They sometimes use it with the prefix di (第), thus making floor five wu lou (5 楼) or di wu ceng (第 5 层).

The first poster, by the way, is always the initiator of the post - and is known as the LZ, or lou zhu (楼主), as in the "owner of the floors". If you see LS (lou shang or "楼上" in characters), that refers to the post immediately before this present post (with the LS remark).

Culinary corruption: The essence of fubai

China is one big nation for delicacies - and the internet world in the PRC is absolutely cooking with great food. We refer, of course, to the world of fubai (腐败), or corruption - a la cuisine.

So how do we link cuisine to corruption? Word has it that those in power more often than not spend entire Everest-loads of cash just on food instead of doing something more decent or job-related. Since this appears to be corrupt practise, the netizenry has equated official corruption to what they do best - munching away on the food.

If you're witness to a post regarding a possible fubai, more often than not, it's an invite to a social - either a KTV-a-thon, an outing, or indeed - a food bash. Just ding away with your name and contact details, find out where the fubai's taking place, and socialise with the forum people - the real people. Fubais often can be social and very rewarding for those part of the event, but be sure to RSVP ahead of time.

Fubais are relatively popular among the Chinese internet world - and that's no surprise to a nation immersed in the best food on the planet.

The essential guide to IT transformation

Next page: Lead me, LD!

More from The Register

next story
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.