Feeds

Mind the Gap Saturday: Forums East and West

Part two: Are you GG or PPMM?

SANS - Survey on application security programs

Mind the Gap Saturday is a feature every Saturday where Blognation China tells its readership the differences - the gap - in the tech, mobile and enterprise worlds between China and the Western world.

We continue our journey through the Chinese forum world, diving deep this time into a few phrases you might encounter on your travels on Chinese forums. Meet the netizens in person and sample great food at fubai events. Mind the majias and out-of-hand ZTs. And yes, we hope to make this a non-orz post.

Which floor are you on?

If you're asked which floor you're on in a forum on the Chinese internet, you'd be more than confused - especially if this is your first visit.

Fear not: most Chinese forums work like a skyscraper - albeit inverted (floors with higher numbers appearing below the first floor). The first floor is always the original post. The first reply (that's post number two) is always floor two. You can pretty much tell which post a fellow "topic resident" is talking about by taking a look at the post number, or adding one to the "floor-in-question" in terms of the reply.

So if you're told to check out the post "on the ninth floor", this would be the ninth message in the thread, or the eighth reply to the original post.

Floors are symbolised by the Chinese characters lou (楼) or ceng (层). They sometimes use it with the prefix di (第), thus making floor five wu lou (5 楼) or di wu ceng (第 5 层).

The first poster, by the way, is always the initiator of the post - and is known as the LZ, or lou zhu (楼主), as in the "owner of the floors". If you see LS (lou shang or "楼上" in characters), that refers to the post immediately before this present post (with the LS remark).

Culinary corruption: The essence of fubai

China is one big nation for delicacies - and the internet world in the PRC is absolutely cooking with great food. We refer, of course, to the world of fubai (腐败), or corruption - a la cuisine.

So how do we link cuisine to corruption? Word has it that those in power more often than not spend entire Everest-loads of cash just on food instead of doing something more decent or job-related. Since this appears to be corrupt practise, the netizenry has equated official corruption to what they do best - munching away on the food.

If you're witness to a post regarding a possible fubai, more often than not, it's an invite to a social - either a KTV-a-thon, an outing, or indeed - a food bash. Just ding away with your name and contact details, find out where the fubai's taking place, and socialise with the forum people - the real people. Fubais often can be social and very rewarding for those part of the event, but be sure to RSVP ahead of time.

Fubais are relatively popular among the Chinese internet world - and that's no surprise to a nation immersed in the best food on the planet.

3 Big data security analytics techniques

Next page: Lead me, LD!

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.