Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!seismo!husc6!sri-unix!sri-spam!ames!ucbcad!zen!ucbvax!jade!eris!mwm
From: mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer)
Newsgroups: comp.sys.amiga
Subject: Design Methodology (Was: Electronic Arts bashing)
Message-ID: <4385@jade.BERKELEY.EDU>
Date: Fri, 17-Jul-87 21:48:40 EDT
Article-I.D.: jade.4385
Posted: Fri Jul 17 21:48:40 1987
Date-Received: Tue, 21-Jul-87 04:13:57 EDT
References:  <2496@husc6.UUCP> <1651@cadovax.UUCP> <880@hp-sdd.HP.COM> <965@gryphon.CTS.COM>
Sender: usenet@jade.BERKELEY.EDU
Reply-To: mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer)
Organization: Missionaria Phonibalonica
Lines: 44

In article <965@gryphon.CTS.COM> greg@gryphon.CTS.COM (Greg Laskin) writes:
 nick@hp-sdd.UUCP (Nick Flor) writes:
<>Right now, we have hackers publishing a lot of the software for 
<>the Amiga using a bottom-up-do-what-is-easiest-first methodology.  
<>Please give me a break.  This only works in the classroom.
<
<"bottom-up" in the classroom gets you a bad grade.  RealLife is