Feeds

Canonical responds to 'abusive' Ubuntu posts

Troll watch

The Power of One Infographic

Administrators overseeing Ubuntu mailing lists are taking steps to thwart and apparent rash of un-Ubuntu-like behavior.

Canonical is investigating what has been reported as "abuse" and "intimidation" of unnamed members of the Ubuntu community email lists. The investigation will produce a set of guidelines that will help decide when to escalate future posts of a similar nature for action to Ubuntu's overall governing board, the community council.

Ubuntu community manager Jono Bacon promised the outcome would not establish a system that censors the thousands of people participating in Ubuntu's more than 300 email lists.

"I don't want to censor people and come up with ideas that make it a very restrictive environment, but want to make sure there's an acceptable level of behavior," Bacon told The Reg.

"The most important thing is to identify the most important means of dealing with this issue and make the Ubuntu community do great work together."

He said that the community already had "key" processes in place and that the existing Ubuntu code of conduct, here, is a good basis for future guidelines.

Bacon is separately organizing a Community Leadership Summit next month in San Jose, California, to debate ways of building what he called "open and frank" communities without imposing too many rules.

Any recommendations on action for the Ubuntu community itself will need the approval of the community council to be adopted as procedure. Currently, there are dates set for when recommendations will be delivered or when the council will meet.

Tech forums and communities in general can have a reputation for sharp and abusive language. Sometimes that can be a simple clash of egos, but there have been genuine attempts to intimidate people.

The Debian Community in 2008 saw women developers threatened by an individual with a grudge who claimed women were "killing" free software. The year before, systems interface and design blogger Kathy Sierra quit the blogosphere, saying she'd received death threats for her posts.

It's unclear what exactly has been said through Ubuntu's email lists, but Bacon categorized the posts as people being snippy with each other, rather than comments being racial or sexist in nature.

Ironically, Canonical and the Ubuntu-Linux community define "Ubuntu" is an African concept of "humanity towards others".

"You see it in every distributed community at some point," said Bacon, who blamed trolls who wanted to be contentious while hiding behind email clients - and who accompany the expansion of any successful project or community.

He believes the Ubuntu community had been lucky not to experience this before. ®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.