From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: *** X-Spam-Status: No, score=3.4 required=5.0 tests=BAYES_50,INVALID_DATE, REPLYTO_WITHOUT_TO_CC autolearn=no autolearn_force=no version=3.4.4 Path: utzoo!utgpu!news-server.csri.toronto.edu!rpi!usc!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!ucbvax!STARS.RESTON.UNISYS.COM!munck From: munck@STARS.RESTON.UNISYS.COM (Bob Munck) Newsgroups: comp.lang.ada Subject: Re: Reserve Demobilization System Built Around Reused Ada Code Message-ID: <17467.677265671@osprey> Date: 18 Jun 91 17:21:11 GMT References: <676362409.27@egsgate.FidoNet.Org> Sender: daemon@ucbvax.BERKELEY.EDU Reply-To: munck@STARS.Reston.Unisys.COM Organization: The Internet List-Id: In article Re: Reserve Demobilization System Built Around Reused Ada Code of 30 May 91 18:30:53 GMT chuck@brain.UUCP and John Goodenough @f98.n250.z1.FidoNet.Org write: >> Let's call a spade a spade. Maybe "rapid tailoring" or "rapid reengineering" >> is a more suitable term for this type of approach. > > I remember a paper some years ago >concerned with generating process control software by a Japanese company in >which they reported high levels of software reuse because they were tailoring >their standard software to each customer's needs. Should we call it reuse >when the end user is different, and otherwise call it enhancement? Toshiba called it "big profits." Note that their "Software Factory" was set up with the help of American consultants (from John G's old company) who couldn't sell the ideas in the US because they required planning beyond the next quarter's P&L statement. Why is John showing a FidoNet address? Have the hackers finally taken over the SEI? Bob Munck