250:
that the principals of the company would retain control. Noftsker favored a more conventional venture capital model, raising a considerable sum of money, but with the investors having control of the company. The two negotiated at length, but neither would compromise. The ensuing discussions of the choice rent the lab into two factions. In
February, 1979, matters came to a head. Greenblatt believed that the proceeds from the construction and sale of a few machines could be profitably reinvested in the funding of the company. Most sided with Noftsker, believing that a commercial venture fund-backed company had a better chance of surviving and commercializing Lisp Machines than Greenblatt's proposed self-sustaining start-up. They went on to start
363:
for a copy of the software. Symbolics had recruited most of the remaining MIT hackers including notable hacker Bill Gosper, who then left the AI Lab. Symbolics forced
Greenblatt to also resign at the AI lab, by citing MIT policies. So for two years at the MIT AI Lab, from 1982 to the end of 1983, Stallman singlehandedly duplicated the efforts of the Symbolics programmers, in order to prevent them from gaining a monopoly on the lab's computers. Although LMI was able to benefit from Stallman's freely available code, he was the last of the "hackers" at the lab. Later programmers would have to sign
261:, was trying to put together an AI natural language computer application, came to Greenblatt, seeking a Lisp machine for his group to work with. Eight months after Greenblatt had his disastrous conference with Noftsker, he had yet to produce anything. Alexander Jacobson decided that the only way Greenblatt was going to actually start his company and build the Lisp machines that Jacobson needed, was if he pushed and financially helped Greenblatt launch his company. Jacobson pulled together business plans, a board, and a partner, F. Stephen Wyle, for Greenblatt. The newfound company was named
136:
410:(of which LMI managed to sell around 200). The 3600, which shipped a year late, expanded on the CADR by widening the machine word to 36-bits, expanding the address space to 28-bits, and adding hardware to accelerate certain common functions that were implemented in microcode on the CADR. The LMI-LAMBDA, which came out a year after the 3600, in 1983, was mostly upward compatible with the CADR (source CADR
32:
328:, while he was able to pay salaries, he didn't actually have a building or any equipment for the programmers to work on. He bargained with Patrick Winston that, in exchange for allowing Symbolics' staff to keep working out of MIT, Symbolics would let MIT use internally and freely all the software Symbolics developed. Unfortunately this openness would later lead to accusations of
307:
suggested that they move on, and spread the gospel beyond the walls of the lab, the hackers at the lab differed wildly in how they wanted the company run. Greenblatt insisted that the company remain true to the hacker spirit, in that it should bow to no one, and focus solely on the creation of a good
362:
believed that LMI, unlike
Symbolics, had tried to avoid hurting the lab. Stallman had proclaimed that "the prospect of charging money for software was a crime against humanity." He clarified, years later, that it is blocking the user's freedom that he believes is a "crime", not the act of charging
249:
Greenblatt and
Noftsker had differing ideas about the structure and financing of the proposed company. Greenblatt believed the company could be "bootstrapped", i.e. financed practically from scratch from the order flow from customers (some of whom were willing to pay in advance). This would mean
457:. Texas Instruments shrunk the Explorer into silicon as the Explorer II and later the MicroExplorer. LMI abandoned the CADR architecture and developed its own K-Machine, but LMI went bankrupt in 1987 before the machine could be brought to market.
438:(TI) joined the fray by investing in LMI after it ran out of money, purchasing and relocating the NuBus engineering workstation unit from Western Digital, licensing the LMI-LAMBDA design and later producing its own variant, the
242:, who had formerly been administrator of the MIT Artificial Intelligence lab some years previously and who had since started and run a small company, was convinced that computers based on the artificial intelligence language
477:-like architecture. Montpetit subsequently became embroiled in a 1989 Canadian political scandal which, as a side-effect, resulted in the seizure of all the assets of GigaMos, rendering the company unable to meet payroll.
391:. Symbolics still had the major advantage that while none of the AI Lab hackers had gone to work for Greenblatt, a solid 14 had signed onto Symbolics. There were two AI Lab people who choose not to be employed by either:
768:
788:
773:
728:
473:, bought the assets of LMI through a Chapter 11 bankruptcy reorganization. Prior to the incorporation of GigaMos, LMI developed a new Lisp machine called the "K-machine" which used a
579:
Q: You once said "the prospect of charging money for software was a crime against humanity." Do you still believe this? A: Well, I was not distinguishing the two meanings of free.
414:
fragments could be reassembled), but there were improvements in instruction fetch and other hardware differences including use of a multiplier chip and a faster logic family and
753:
798:
763:
748:
738:
793:
758:
743:
733:
778:
783:
402:
Symbolics ended up producing around 100 LM-2s, each of which sold for $ 70,000. Both companies developed second-generation products based on the CADR: the
593:
279:
308:
product. Some other hackers felt that this was not the way to lead a company. If this was done, it would never grow and truly spread the word of the
379:
Lisp
Machines, Inc. sold its first LISP machines, designed at MIT, as the LMI-CADR. After a series of internal battles, Symbolics began selling the
246:
had a bright future commercially. There were a number of ready customers who were anxious to get machines similar to ones they had seen at MIT.
570:
434:
Corporation. This allowed the popular LAMBDA "2x2" configuration whereby two machines shared one infrastructure, with considerable savings.
723:
610:
553:
115:
427:
212:
177:
485:
According to
Richard Stallman, the dispute between LMI and Symbolics inspired Stallman to start software development for the
296:
53:
49:
335:
In the early 1980s, to prevent software from being used on their competitors' computers, manufacturers stopped distributing
312:. Furthermore, Greenblatt demanded control over the company, to ensure that his vision was carried forth. Others (including
96:
497:
68:
628:
Proceedings of the 12th annual international symposium on
Computer architecture, June 17–19, 1985, Boston, Massachusetts
450:
329:
668:"Lisp Machine Inc. K-machine: The Deffenbaugh, Marshall, Powell, Willison architecture as remembered by Joe Marshall"
75:
339:
and began using copyright and restrictive software licenses to limit or prohibit copying and redistribution. Such
42:
446:
493:
384:
364:
258:
228:
166:
82:
454:
383:
from the MIT Lab as the LM-2. Symbolics had been hindered by
Noftsker's promise to give Greenblatt a year's
317:
64:
602:
344:
234:
By 1979, the Lisp
Machine Project at MIT, originated and headed by Greenblatt, had constructed over 30
682:
343:
had existed before, but this shift in the legal characteristics of software was triggered by the U.S.
641:
355:
340:
574:
470:
348:
469:; Greenblatt was one of its officers. GigaMos, through the ownership of a Canadian backer named
407:
606:
549:
435:
284:
489:
392:
359:
304:
288:
239:
89:
431:
388:
717:
542:
396:
598:
415:
380:
309:
300:
235:
224:
20:
667:
135:
430:'s group at MIT, and, through a separate chain of events, was being developed by
439:
368:
336:
313:
274:
31:
265:(LMI), and was funded mostly by order flow including CDC orders, via Jacobson.
283:(1984). Levy's account of hackers is in large part based on the values of the
220:
423:
411:
403:
325:
251:
445:
Symbolics continued to develop the 3600 family and its operating system,
705:
521:
287:
at MIT Artificial
Intelligence Laboratory. Among these hackers was
501:
419:
295:
The people at the lab came together, and together created a true
19:
This article is about the company. For the type of computer, see
544:
Free as in Freedom: Richard Stallman's Crusade for Free Software
474:
320:) felt that to be under the rule of Greenblatt was unacceptable.
243:
486:
216:
25:
708:
by Richard Stallman in which he gives his views on Greenblatt
418:. The LAMBDA's processor cards were designed to work in a
371:
or technical information with other software developers.
540:
Williams, Sam (2002). "Chapter 6: The Emacs Commune".
273:
The following parable-like story is told about LMI by
626:
David A. Moon. "Architecture of the Symbolics 3600".
496:(FSF) in October 1985. These were forerunners of the
291:, whom Levy at the time called the last true hacker.
683:"Hi-tech disagreements | Maclean's | JUNE 26, 1989"
198:
183:
173:
150:
142:
56:. Unsourced material may be challenged and removed.
541:
769:Defunct computer companies based in Massachusetts
789:Defunct software companies of the United States
774:Defunct computer companies of the United States
293:
729:Lisp (programming language) software companies
8:
128:
754:Companies based in Cambridge, Massachusetts
594:Hackers: Heroes of the Computer Revolution
481:Inspiration for Stallman and Free Software
280:Hackers: Heroes of the Computer Revolution
134:
127:
799:Software companies disestablished in 1987
764:Computer companies disestablished in 1987
749:American companies disestablished in 1987
116:Learn how and when to remove this message
739:1987 disestablishments in Massachusetts
512:
238:computers for various projects at MIT.
794:Software companies established in 1979
759:Computer companies established in 1979
744:American companies established in 1979
571:"Richard Stallman, Live and Unplugged"
257:Alexander Jacobson, a consultant from
7:
734:1979 establishments in Massachusetts
422:-based engineering workstation, the
387:, and by severe delays in procuring
54:adding citations to reliable sources
779:Defunct computer hardware companies
784:Defunct computer systems companies
221:Artificial Intelligence Laboratory
14:
569:Maguire, James (March 31, 2008).
687:Maclean's | The Complete Archive
211:was a company formed in 1979 by
30:
426:, which had been originated by
354:While both companies delivered
277:and used for the first time in
41:needs additional citations for
1:
498:open-source-software movement
573:. Datamation. Archived from
449:, and produced the Ivory, a
16:Computer company (1979–1987)
724:Lisp (programming language)
453:chip implementation of the
330:intellectual property theft
156:; 45 years ago
815:
18:
492:in January 1984, and the
365:non-disclosure agreements
299:'s machine, the original
133:
494:Free Software Foundation
465:LMI was reincarnated as
229:Cambridge, Massachusetts
167:Cambridge, Massachusetts
530:around the 46th minute
455:Symbolics architecture
324:When Noftsker started
322:
591:Levy, Steven (1984).
345:Copyright Act of 1976
520:Cringely, Robert X.
375:Struggle and decline
356:proprietary software
341:proprietary software
50:improve this article
642:"Lisp Stake Bought"
522:"#4 Brewster Kahle"
209:Lisp Machines, Inc.
130:
129:Lisp Machines, Inc.
648:. 2 September 1983
577:on April 8, 2008.
548:. O'Reilly Media.
504:operating system.
349:software copyright
263:LISP Machine, Inc.
227:. It was based in
213:Richard Greenblatt
178:Richard Greenblatt
630:. pp. 76–83.
436:Texas Instruments
206:
205:
126:
125:
118:
100:
806:
709:
703:
697:
696:
694:
693:
678:
672:
671:
664:
658:
657:
655:
653:
638:
632:
631:
623:
617:
616:
588:
582:
581:
566:
560:
559:
547:
537:
531:
529:
517:
490:operating system
393:Richard Stallman
360:Richard Stallman
305:Russell Noftsker
289:Richard Stallman
240:Russell Noftsker
194:
192:
164:
162:
157:
138:
131:
121:
114:
110:
107:
101:
99:
58:
34:
26:
814:
813:
809:
808:
807:
805:
804:
803:
714:
713:
712:
704:
700:
691:
689:
680:
679:
675:
666:
665:
661:
651:
649:
640:
639:
635:
625:
624:
620:
613:
590:
589:
585:
568:
567:
563:
556:
539:
538:
534:
519:
518:
514:
510:
483:
467:GigaMos Systems
463:
461:GigaMos Systems
432:Western Digital
389:venture capital
377:
271:
190:
188:
169:, United States
160:
158:
155:
122:
111:
105:
102:
65:"Lisp Machines"
59:
57:
47:
35:
24:
17:
12:
11:
5:
812:
810:
802:
801:
796:
791:
786:
781:
776:
771:
766:
761:
756:
751:
746:
741:
736:
731:
726:
716:
715:
711:
710:
698:
681:KAIHLA, PAUL.
673:
659:
646:New York Times
633:
618:
611:
583:
561:
554:
532:
511:
509:
506:
482:
479:
462:
459:
404:Symbolics 3600
376:
373:
270:
269:History of LMI
267:
204:
203:
200:
196:
195:
185:
181:
180:
175:
171:
170:
152:
148:
147:
144:
140:
139:
124:
123:
38:
36:
29:
15:
13:
10:
9:
6:
4:
3:
2:
811:
800:
797:
795:
792:
790:
787:
785:
782:
780:
777:
775:
772:
770:
767:
765:
762:
760:
757:
755:
752:
750:
747:
745:
742:
740:
737:
735:
732:
730:
727:
725:
722:
721:
719:
707:
702:
699:
688:
684:
677:
674:
669:
663:
660:
647:
643:
637:
634:
629:
622:
619:
614:
612:0-385-19195-2
608:
604:
600:
596:
595:
587:
584:
580:
576:
572:
565:
562:
557:
555:0-596-00287-4
551:
546:
545:
536:
533:
527:
523:
516:
513:
507:
505:
503:
499:
495:
491:
488:
480:
478:
476:
472:
471:Guy Montpetit
468:
460:
458:
456:
452:
448:
443:
441:
437:
433:
429:
425:
421:
417:
413:
409:
405:
400:
398:
397:Marvin Minsky
394:
390:
386:
382:
374:
372:
370:
367:not to share
366:
361:
357:
352:
350:
346:
342:
338:
333:
331:
327:
321:
319:
315:
311:
306:
302:
301:Lisp Machines
298:
292:
290:
286:
282:
281:
276:
268:
266:
264:
260:
255:
253:
247:
245:
241:
237:
232:
230:
226:
225:Lisp machines
222:
218:
214:
210:
201:
197:
186:
182:
179:
176:
172:
168:
153:
149:
145:
141:
137:
132:
120:
117:
109:
98:
95:
91:
88:
84:
81:
77:
74:
70:
67: –
66:
62:
61:Find sources:
55:
51:
45:
44:
39:This article
37:
33:
28:
27:
22:
701:
690:. Retrieved
686:
676:
662:
650:. Retrieved
645:
636:
627:
621:
599:Anchor Press
592:
586:
578:
575:the original
564:
543:
535:
525:
515:
484:
466:
464:
444:
416:cache memory
401:
378:
353:
334:
323:
310:hacker ethic
294:
278:
272:
262:
256:
248:
233:
208:
207:
112:
103:
93:
86:
79:
72:
60:
48:Please help
43:verification
40:
21:Lisp machine
440:TI Explorer
369:source code
337:source code
314:Bill Gosper
275:Steven Levy
718:Categories
692:2020-10-01
508:References
428:Steve Ward
408:LMI-LAMBDA
385:head start
318:Tom Knight
202:Bankruptcy
76:newspapers
652:2 October
603:Doubleday
424:NuMachine
412:microcode
326:Symbolics
252:Symbolics
223:to build
146:Computers
106:June 2017
706:A speech
670:. Tunes.
500:and the
406:and the
143:Industry
303:. When
285:hackers
189: (
184:Defunct
174:Founder
159: (
151:Founded
90:scholar
609:
552:
526:NerdTV
447:Genera
347:; see
297:hacker
92:
85:
78:
71:
63:
502:Linux
420:NuBus
254:Inc.
97:JSTOR
83:books
654:2013
607:ISBN
550:ISBN
475:RISC
451:VLSI
395:and
381:CADR
316:and
244:LISP
236:CADR
199:Fate
191:1987
187:1987
161:1979
154:1979
69:news
487:GNU
259:CDC
219:'s
217:MIT
215:of
165:in
52:by
720::
685:.
644:.
605:.
597:.
524:.
442:.
399:.
358:,
351:.
332:.
231:.
695:.
656:.
615:.
601:/
558:.
528:.
193:)
163:)
119:)
113:(
108:)
104:(
94:·
87:·
80:·
73:·
46:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.