Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!seismo!husc6!sri-unix!sri-spam!ames!ucbcad!zen!ucbvax!jade!eris!mwm From: mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer) Newsgroups: comp.sys.amiga Subject: Design Methodology (Was: Electronic Arts bashing) Message-ID: <4385@jade.BERKELEY.EDU> Date: Fri, 17-Jul-87 21:48:40 EDT Article-I.D.: jade.4385 Posted: Fri Jul 17 21:48:40 1987 Date-Received: Tue, 21-Jul-87 04:13:57 EDT References:<2496@husc6.UUCP> <1651@cadovax.UUCP> <880@hp-sdd.HP.COM> <965@gryphon.CTS.COM> Sender: usenet@jade.BERKELEY.EDU Reply-To: mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer) Organization: Missionaria Phonibalonica Lines: 44 In article <965@gryphon.CTS.COM> greg@gryphon.CTS.COM (Greg Laskin) writes: nick@hp-sdd.UUCP (Nick Flor) writes: <>Right now, we have hackers publishing a lot of the software for <>the Amiga using a bottom-up-do-what-is-easiest-first methodology. <>Please give me a break. This only works in the classroom. < <"bottom-up" in the classroom gets you a bad grade. RealLife is