Language Selection

English French German Italian Portuguese Spanish

Gentoo's Proposed Code of Conduct Adopted

Filed under
Gentoo

In no small part due to the wide exposure of a high-profile article published earlier in the week on in-fighting and other disgraceful behaviors from developers and contributors, Gentoo announced a proposed Code of Conduct. Today, a vote on the proposed Gentoo Code of Conduct passed with votes tallying 6 to 1.


Some of the guidelines include:

Acceptable behaviour

Be courteous. Though respect is earned, it must start somewhere. Respect someones right for their own opinion and acknowledge that they do deserve a measure of politeness in your response.

Give accurate information in the spirit of being helpful.

Respectfully disagree with or challenge other members. The operative word here is respectfully.

Using the correct forum for your post. Bug reports and idle chatter do not belong on the gentoo-dev mailing list; discussion about a wide-ranging change to the tree probably does not belong on Bugzilla. Different fora will also have different standards of behaviour -- a joke that is perfectly acceptable on IRC will be taken differently when made on a mailing list.

Admit the possibility of fault and respect different point of views. No one is perfect -- you will get things wrong occasionally. Don't be afraid to admit this. Similarly, while something may seem perfectly obvious to you, others may see it differently.

If you screw up, take responsibility for your actions.

Unacceptable behaviour

Flaming and trolling. What is trolling? You are deemed to be trolling if you make comments intended to provoke an angry response from others. What is flaming? Flaming is the act of sending or posting messages that are deliberately hostile and insulting.

Posting/participating only to incite drama or negativity rather than to tactfully share information.

Being judgmental, mean-spirited or insulting. It is possible to respectfully challenge someone in a way that empowers without being judgemental.

Constantly purveying misinformation despite repeated warnings.


Disciplinary action can be imposed and will be up to the discretion of an official charged with the duty of maintaining good order. Breaches of the Code of Conduct guidelines can be reported to the proctors.

Full Document here

re: Gentoo

Isn't it fun watching a bunch of little children acting like grownups?

The only thing that "document" left out was "double dog dare you" rules and whose mother was going to take everyone home if they continued to misbehave.

How sad that a once bleeding edge distro falls into such disarray and childish behavior.

Business geeks the world over must look at projects like this and just laugh their collective asses off. Perhaps one of them will be kind enough to loan these guys a copy of "Business Management for Dummies" book.

re: Gentoo

Not really on topic to what you said, but I got to say how much better things are running with site under debian. Just one example, used to in gentoo when the nightly backups/crons would run, my site would just almost stop. Tar and cp would use up a good deal of the resources. I had them set up to run at nice 19, but still it was miserable. When the backups run now under debian, it doesn't even breath hard. In fact, the whole of memory management is handled much better in debian. Sure I was still using a 2.4 kernel on the server under gentoo, but copying large files under 2.6 on my desktop will make other things practically unusable until it's done. A few folks have told me that site seems to be faster now. I don't know what's up exactly, but I'm really glad I made the switch.

re: Gentoo

I guess it's not just me then. It's not perfect, but the pages are loading a -lot- better than they used to. Before, sometimes I would give up because it loaded so slow (no offense!) but now it's far easier to navigate. I am surprised it make such a big difference. Good to note.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security: Updates, IBM, Elytron and Container Vulnerability Scanning

  • Security updates for Friday
  • IBM Security launches open-source AI
    IBM Security unveiled an open-source toolkit at RSA 2018 that will allow the cyber community to test their AI-based security defenses against a strong and complex opponent in order to help build resilience and dependability into their systems.
  • Elytron: A New Security Framework in WildFly/JBoss EAP
    Elytron is a new security framework that ships with WildFly version 10 and Red Hat JBoss Enterprise Application Platform (EAP) 7.1. This project is a complete replacement of PicketBox and JAAS. Elytron is a single security framework that will be usable for securing management access to the server and for securing applications deployed in WildFly. You can still use the legacy security framework, which is PicketBox, but it is a deprecated module; hence, there is no guarantee that PicketBox will be included in future releases of WildFly. In this article, we will explore the components of Elytron and how to configure them in Wildfly.
  • PodCTL #32 – Container Vulnerability Scanning

NetBSD 8.0 RC1 Available, Bringing Initial USB 3.0 Support & Spectre/Meltdown Mitigation

It's a busy month for the BSDs with DragonFlyBSD 5.2 having come along with OpenBSD 6.3 and right before that was TrueOS 18.03. Now there's finally the release candidate of the long-awaited NetBSD 8.0 update. NetBSD 7.0 arrived back in October 2015 while the NetBSD 8.0 release should not be too much further out. Arguably most interesting with NetBSD 8.0 is its finally bring initial USB 3.0 support though the change-log currently just describes it as "some USB 3 support." Read more

FFmpeg 4.0 Released

  • FFmpeg 4.0 released
    Version 4.0 of the FFmpeg multimedia toolkit is out. There is a long list of new filters, formats, and more; see the announcement for details.
  • April 20th, 2018, FFmpeg 4.0 "Wu"
  • FFmpeg 4.0 Released With New Encoders/Decoders, NVIDIA NVDEC Decoding
    FFmpeg 4.0 is now available as the latest major release for this widely-used open-source multimedia encode/decoder library. FFmpeg 4.0 introduces NVIDIA NVDEC GPU-based decoding for H264 / MJPEG / HEVC / MPEG-1/2/4, VC1, VP8, and VP9 formats. This release also adds an Intel QSV accelerated overlay filter, an OpenCL overlay filter, VA-API MJPEG and VP8 decoding support, new VA-API filters, and many other accelerated code path improvements.

Graphics: AMD, Intel and Vulkan

  • AMDGPU DC Fixes For Linux 4.17 Take Care Of "The Dark Screen Issue"
    AMD's Alex Deucher has sent in a small set of fixes for the AMDGPU Direct Rendering Manager driver in the Linux 4.17 kernel. The three patches are for fixing a dark screen issue with AMDGPU DC, a fix for clock/voltage dependency tracking for WattMan, and an updated SMU interface for the yet-to-be-announced Vega 12 GPU.
  • Intel KVMGT 2018-Q1 Release Offers Mediated GPU Pass-Through Improvements
    While the relevant bits for supporting Intel GPU mediated pass-through to virtual machines with KVM are now upstream in the Linux kernel as well as in QEMU 2.12, Intel developers have just announced their quarterly release of "KVMGT" for those wanting the officially blessed configuration for running Intel virtual GPU support with KVM virtual machines.
  • RADV Vulkan Driver Adds Vega M Support
    Following RadeonSI adding "Vega M" support for the new Radeon graphics appearing embedded on select Intel Kabylake processor packages, the RADV developers have similarly staged their Vega M support in this open-source Vulkan driver.
  • The Forge Now Offers Full-Featured Vulkan Support On Linux
    Earlier this month we covered "The Forge" picking up initial Linux support and now they have rounded out their full-featured Linux support with Vulkan rendering.