|Deletions are marked like this.||Additions are marked like this.|
|Line 49:||Line 49:|
|1. [[UbuntuSpec:foundations-security-standards-oval|Implement the Open Vulnerability Assessment Language for Ubuntu and derivatives]]||1. [[UbuntuSpec:foundations-security-standards-oval|Implement the Open Vulnerability Assessment Language for Ubuntu and derivatives]] - shouldn't this be a security blueprint, targeted for the security track?|
Note: This page is for prioritizing Foundations track UDS-M sessions. For general Maverick planning, please see FoundationsTeam/Maverick/Planning.
[ACCEPTED] 10.04 Review - hold this early to aid breakout topics, maybe in the first roundtable
[ACCEPTED] packagekit as backend for software-center
[ACCEPTED] Finish Upstart (seconded by OEM indirectly for their interest in continued boot performance improvements)
[ACCEPTED] btrfs Support (seconded by OEM)
Package Culling - find and aggressively deal with packages whose merges have been lagging for several releases
Discuss testing (seconded by OEM)
Remove Demoted Packages on Upgrade - We need to explore the removal of demoted packages on upgrade (all, only auto-installed ones, only default installed ones, only unused... how to detect).
Boot Performance/Experience (seconded by OEM)
CD build speed - CD build speed has been creeping back up of late; attack it again
Spring Clean - right after an LTS release is a good time for an aggressive cleanup of things we don't need or that should be extensively refactored
Eliminate symlinks for python-central and python-support using PEP 3147? Needs support for extensions. (And mostly done for python-central). (BarryWarsaw). This is a duplicate of foundations-lucid-robust-python-packaging.
- Python Versions: Barry thinks the following might be able to go into a single session (if so, we'll need to create a blueprint for the two, in order to schedule it):
Compile for i686 as the default on i386 - instead of i486
Use Energy Star compliance power settings by default (proposed by OEM)
Use xz compression by default for binary packages (proposed by community member)
Use Swap Files Instead of Swap Partitions (carried over from Karmic)
Better archive crawler (carried over from Lucid)
Improved Platform-Internationalization Collaboration (seconded by OEM)
Enable Hybrid suspend/hibernate by Default (proposed by OEM)
Implement the Open Vulnerability Assessment Language for Ubuntu and derivatives - shouldn't this be a security blueprint, targeted for the security track?