Feeds

Canonical responds to 'abusive' Ubuntu posts

Troll watch

Mobile application security vulnerability report

Administrators overseeing Ubuntu mailing lists are taking steps to thwart and apparent rash of un-Ubuntu-like behavior.

Canonical is investigating what has been reported as "abuse" and "intimidation" of unnamed members of the Ubuntu community email lists. The investigation will produce a set of guidelines that will help decide when to escalate future posts of a similar nature for action to Ubuntu's overall governing board, the community council.

Ubuntu community manager Jono Bacon promised the outcome would not establish a system that censors the thousands of people participating in Ubuntu's more than 300 email lists.

"I don't want to censor people and come up with ideas that make it a very restrictive environment, but want to make sure there's an acceptable level of behavior," Bacon told The Reg.

"The most important thing is to identify the most important means of dealing with this issue and make the Ubuntu community do great work together."

He said that the community already had "key" processes in place and that the existing Ubuntu code of conduct, here, is a good basis for future guidelines.

Bacon is separately organizing a Community Leadership Summit next month in San Jose, California, to debate ways of building what he called "open and frank" communities without imposing too many rules.

Any recommendations on action for the Ubuntu community itself will need the approval of the community council to be adopted as procedure. Currently, there are dates set for when recommendations will be delivered or when the council will meet.

Tech forums and communities in general can have a reputation for sharp and abusive language. Sometimes that can be a simple clash of egos, but there have been genuine attempts to intimidate people.

The Debian Community in 2008 saw women developers threatened by an individual with a grudge who claimed women were "killing" free software. The year before, systems interface and design blogger Kathy Sierra quit the blogosphere, saying she'd received death threats for her posts.

It's unclear what exactly has been said through Ubuntu's email lists, but Bacon categorized the posts as people being snippy with each other, rather than comments being racial or sexist in nature.

Ironically, Canonical and the Ubuntu-Linux community define "Ubuntu" is an African concept of "humanity towards others".

"You see it in every distributed community at some point," said Bacon, who blamed trolls who wanted to be contentious while hiding behind email clients - and who accompany the expansion of any successful project or community.

He believes the Ubuntu community had been lucky not to experience this before. ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.