Knowledge (XXG)

Lisp Machines

Source 📝

250:
that the principals of the company would retain control. Noftsker favored a more conventional venture capital model, raising a considerable sum of money, but with the investors having control of the company. The two negotiated at length, but neither would compromise. The ensuing discussions of the choice rent the lab into two factions. In February, 1979, matters came to a head. Greenblatt believed that the proceeds from the construction and sale of a few machines could be profitably reinvested in the funding of the company. Most sided with Noftsker, believing that a commercial venture fund-backed company had a better chance of surviving and commercializing Lisp Machines than Greenblatt's proposed self-sustaining start-up. They went on to start
363:
for a copy of the software. Symbolics had recruited most of the remaining MIT hackers including notable hacker Bill Gosper, who then left the AI Lab. Symbolics forced Greenblatt to also resign at the AI lab, by citing MIT policies. So for two years at the MIT AI Lab, from 1982 to the end of 1983, Stallman singlehandedly duplicated the efforts of the Symbolics programmers, in order to prevent them from gaining a monopoly on the lab's computers. Although LMI was able to benefit from Stallman's freely available code, he was the last of the "hackers" at the lab. Later programmers would have to sign
261:, was trying to put together an AI natural language computer application, came to Greenblatt, seeking a Lisp machine for his group to work with. Eight months after Greenblatt had his disastrous conference with Noftsker, he had yet to produce anything. Alexander Jacobson decided that the only way Greenblatt was going to actually start his company and build the Lisp machines that Jacobson needed, was if he pushed and financially helped Greenblatt launch his company. Jacobson pulled together business plans, a board, and a partner, F. Stephen Wyle, for Greenblatt. The newfound company was named 136: 410:(of which LMI managed to sell around 200). The 3600, which shipped a year late, expanded on the CADR by widening the machine word to 36-bits, expanding the address space to 28-bits, and adding hardware to accelerate certain common functions that were implemented in microcode on the CADR. The LMI-LAMBDA, which came out a year after the 3600, in 1983, was mostly upward compatible with the CADR (source CADR 32: 328:, while he was able to pay salaries, he didn't actually have a building or any equipment for the programmers to work on. He bargained with Patrick Winston that, in exchange for allowing Symbolics' staff to keep working out of MIT, Symbolics would let MIT use internally and freely all the software Symbolics developed. Unfortunately this openness would later lead to accusations of 307:
suggested that they move on, and spread the gospel beyond the walls of the lab, the hackers at the lab differed wildly in how they wanted the company run. Greenblatt insisted that the company remain true to the hacker spirit, in that it should bow to no one, and focus solely on the creation of a good
362:
believed that LMI, unlike Symbolics, had tried to avoid hurting the lab. Stallman had proclaimed that "the prospect of charging money for software was a crime against humanity." He clarified, years later, that it is blocking the user's freedom that he believes is a "crime", not the act of charging
249:
Greenblatt and Noftsker had differing ideas about the structure and financing of the proposed company. Greenblatt believed the company could be "bootstrapped", i.e. financed practically from scratch from the order flow from customers (some of whom were willing to pay in advance). This would mean
457:. Texas Instruments shrunk the Explorer into silicon as the Explorer II and later the MicroExplorer. LMI abandoned the CADR architecture and developed its own K-Machine, but LMI went bankrupt in 1987 before the machine could be brought to market. 438:(TI) joined the fray by investing in LMI after it ran out of money, purchasing and relocating the NuBus engineering workstation unit from Western Digital, licensing the LMI-LAMBDA design and later producing its own variant, the 242:, who had formerly been administrator of the MIT Artificial Intelligence lab some years previously and who had since started and run a small company, was convinced that computers based on the artificial intelligence language 477:-like architecture. Montpetit subsequently became embroiled in a 1989 Canadian political scandal which, as a side-effect, resulted in the seizure of all the assets of GigaMos, rendering the company unable to meet payroll. 391:. Symbolics still had the major advantage that while none of the AI Lab hackers had gone to work for Greenblatt, a solid 14 had signed onto Symbolics. There were two AI Lab people who choose not to be employed by either: 768: 788: 773: 728: 473:, bought the assets of LMI through a Chapter 11 bankruptcy reorganization. Prior to the incorporation of GigaMos, LMI developed a new Lisp machine called the "K-machine" which used a 579:
Q: You once said "the prospect of charging money for software was a crime against humanity." Do you still believe this? A: Well, I was not distinguishing the two meanings of free.
414:
fragments could be reassembled), but there were improvements in instruction fetch and other hardware differences including use of a multiplier chip and a faster logic family and
753: 798: 763: 748: 738: 793: 758: 743: 733: 778: 783: 402:
Symbolics ended up producing around 100 LM-2s, each of which sold for $ 70,000. Both companies developed second-generation products based on the CADR: the
593: 279: 308:
product. Some other hackers felt that this was not the way to lead a company. If this was done, it would never grow and truly spread the word of the
379:
Lisp Machines, Inc. sold its first LISP machines, designed at MIT, as the LMI-CADR. After a series of internal battles, Symbolics began selling the
246:
had a bright future commercially. There were a number of ready customers who were anxious to get machines similar to ones they had seen at MIT.
570: 434:
Corporation. This allowed the popular LAMBDA "2x2" configuration whereby two machines shared one infrastructure, with considerable savings.
723: 610: 553: 115: 427: 212: 177: 485:
According to Richard Stallman, the dispute between LMI and Symbolics inspired Stallman to start software development for the
296: 53: 49: 335:
In the early 1980s, to prevent software from being used on their competitors' computers, manufacturers stopped distributing
312:. Furthermore, Greenblatt demanded control over the company, to ensure that his vision was carried forth. Others (including 96: 497: 68: 628:
Proceedings of the 12th annual international symposium on Computer architecture, June 17–19, 1985, Boston, Massachusetts
450: 329: 668:"Lisp Machine Inc. K-machine: The Deffenbaugh, Marshall, Powell, Willison architecture as remembered by Joe Marshall" 75: 339:
and began using copyright and restrictive software licenses to limit or prohibit copying and redistribution. Such
42: 446: 493: 384: 364: 258: 228: 166: 82: 454: 383:
from the MIT Lab as the LM-2. Symbolics had been hindered by Noftsker's promise to give Greenblatt a year's
317: 64: 602: 344: 234:
By 1979, the Lisp Machine Project at MIT, originated and headed by Greenblatt, had constructed over 30
682: 343:
had existed before, but this shift in the legal characteristics of software was triggered by the U.S.
641: 355: 340: 574: 470: 348: 469:; Greenblatt was one of its officers. GigaMos, through the ownership of a Canadian backer named 407: 606: 549: 435: 284: 489: 392: 359: 304: 288: 239: 89: 431: 388: 717: 542: 396: 598: 415: 380: 309: 300: 235: 224: 20: 667: 135: 430:'s group at MIT, and, through a separate chain of events, was being developed by 439: 368: 336: 313: 274: 31: 265:(LMI), and was funded mostly by order flow including CDC orders, via Jacobson. 283:(1984). Levy's account of hackers is in large part based on the values of the 220: 423: 411: 403: 325: 251: 445:
Symbolics continued to develop the 3600 family and its operating system,
705: 521: 287:
at MIT Artificial Intelligence Laboratory. Among these hackers was
501: 419: 295:
The people at the lab came together, and together created a true
19:
This article is about the company. For the type of computer, see
544:
Free as in Freedom: Richard Stallman's Crusade for Free Software
474: 320:) felt that to be under the rule of Greenblatt was unacceptable. 243: 486: 216: 25: 708:
by Richard Stallman in which he gives his views on Greenblatt
418:. The LAMBDA's processor cards were designed to work in a 371:
or technical information with other software developers.
540:
Williams, Sam (2002). "Chapter 6: The Emacs Commune".
273:
The following parable-like story is told about LMI by
626:
David A. Moon. "Architecture of the Symbolics 3600".
496:(FSF) in October 1985. These were forerunners of the 291:, whom Levy at the time called the last true hacker. 683:"Hi-tech disagreements | Maclean's | JUNE 26, 1989" 198: 183: 173: 150: 142: 56:. Unsourced material may be challenged and removed. 541: 769:Defunct computer companies based in Massachusetts 789:Defunct software companies of the United States 774:Defunct computer companies of the United States 293: 729:Lisp (programming language) software companies 8: 128: 754:Companies based in Cambridge, Massachusetts 594:Hackers: Heroes of the Computer Revolution 481:Inspiration for Stallman and Free Software 280:Hackers: Heroes of the Computer Revolution 134: 127: 799:Software companies disestablished in 1987 764:Computer companies disestablished in 1987 749:American companies disestablished in 1987 116:Learn how and when to remove this message 739:1987 disestablishments in Massachusetts 512: 238:computers for various projects at MIT. 794:Software companies established in 1979 759:Computer companies established in 1979 744:American companies established in 1979 571:"Richard Stallman, Live and Unplugged" 257:Alexander Jacobson, a consultant from 7: 734:1979 establishments in Massachusetts 422:-based engineering workstation, the 387:, and by severe delays in procuring 54:adding citations to reliable sources 779:Defunct computer hardware companies 784:Defunct computer systems companies 221:Artificial Intelligence Laboratory 14: 569:Maguire, James (March 31, 2008). 687:Maclean's | The Complete Archive 211:was a company formed in 1979 by 30: 426:, which had been originated by 354:While both companies delivered 277:and used for the first time in 41:needs additional citations for 1: 498:open-source-software movement 573:. Datamation. Archived from 449:, and produced the Ivory, a 16:Computer company (1979–1987) 724:Lisp (programming language) 453:chip implementation of the 330:intellectual property theft 156:; 45 years ago 815: 18: 492:in January 1984, and the 365:non-disclosure agreements 299:'s machine, the original 133: 494:Free Software Foundation 465:LMI was reincarnated as 229:Cambridge, Massachusetts 167:Cambridge, Massachusetts 530:around the 46th minute 455:Symbolics architecture 324:When Noftsker started 322: 591:Levy, Steven (1984). 345:Copyright Act of 1976 520:Cringely, Robert X. 375:Struggle and decline 356:proprietary software 341:proprietary software 50:improve this article 642:"Lisp Stake Bought" 522:"#4 Brewster Kahle" 209:Lisp Machines, Inc. 130: 129:Lisp Machines, Inc. 648:. 2 September 1983 577:on April 8, 2008. 548:. O'Reilly Media. 504:operating system. 349:software copyright 263:LISP Machine, Inc. 227:. It was based in 213:Richard Greenblatt 178:Richard Greenblatt 630:. pp. 76–83. 436:Texas Instruments 206: 205: 126: 125: 118: 100: 806: 709: 703: 697: 696: 694: 693: 678: 672: 671: 664: 658: 657: 655: 653: 638: 632: 631: 623: 617: 616: 588: 582: 581: 566: 560: 559: 547: 537: 531: 529: 517: 490:operating system 393:Richard Stallman 360:Richard Stallman 305:Russell Noftsker 289:Richard Stallman 240:Russell Noftsker 194: 192: 164: 162: 157: 138: 131: 121: 114: 110: 107: 101: 99: 58: 34: 26: 814: 813: 809: 808: 807: 805: 804: 803: 714: 713: 712: 704: 700: 691: 689: 680: 679: 675: 666: 665: 661: 651: 649: 640: 639: 635: 625: 624: 620: 613: 590: 589: 585: 568: 567: 563: 556: 539: 538: 534: 519: 518: 514: 510: 483: 467:GigaMos Systems 463: 461:GigaMos Systems 432:Western Digital 389:venture capital 377: 271: 190: 188: 169:, United States 160: 158: 155: 122: 111: 105: 102: 65:"Lisp Machines" 59: 57: 47: 35: 24: 17: 12: 11: 5: 812: 810: 802: 801: 796: 791: 786: 781: 776: 771: 766: 761: 756: 751: 746: 741: 736: 731: 726: 716: 715: 711: 710: 698: 681:KAIHLA, PAUL. 673: 659: 646:New York Times 633: 618: 611: 583: 561: 554: 532: 511: 509: 506: 482: 479: 462: 459: 404:Symbolics 3600 376: 373: 270: 269:History of LMI 267: 204: 203: 200: 196: 195: 185: 181: 180: 175: 171: 170: 152: 148: 147: 144: 140: 139: 124: 123: 38: 36: 29: 15: 13: 10: 9: 6: 4: 3: 2: 811: 800: 797: 795: 792: 790: 787: 785: 782: 780: 777: 775: 772: 770: 767: 765: 762: 760: 757: 755: 752: 750: 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 721: 719: 707: 702: 699: 688: 684: 677: 674: 669: 663: 660: 647: 643: 637: 634: 629: 622: 619: 614: 612:0-385-19195-2 608: 604: 600: 596: 595: 587: 584: 580: 576: 572: 565: 562: 557: 555:0-596-00287-4 551: 546: 545: 536: 533: 527: 523: 516: 513: 507: 505: 503: 499: 495: 491: 488: 480: 478: 476: 472: 471:Guy Montpetit 468: 460: 458: 456: 452: 448: 443: 441: 437: 433: 429: 425: 421: 417: 413: 409: 405: 400: 398: 397:Marvin Minsky 394: 390: 386: 382: 374: 372: 370: 367:not to share 366: 361: 357: 352: 350: 346: 342: 338: 333: 331: 327: 321: 319: 315: 311: 306: 302: 301:Lisp Machines 298: 292: 290: 286: 282: 281: 276: 268: 266: 264: 260: 255: 253: 247: 245: 241: 237: 232: 230: 226: 225:Lisp machines 222: 218: 214: 210: 201: 197: 186: 182: 179: 176: 172: 168: 153: 149: 145: 141: 137: 132: 120: 117: 109: 98: 95: 91: 88: 84: 81: 77: 74: 70: 67: –  66: 62: 61:Find sources: 55: 51: 45: 44: 39:This article 37: 33: 28: 27: 22: 701: 690:. Retrieved 686: 676: 662: 650:. Retrieved 645: 636: 627: 621: 599:Anchor Press 592: 586: 578: 575:the original 564: 543: 535: 525: 515: 484: 466: 464: 444: 416:cache memory 401: 378: 353: 334: 323: 310:hacker ethic 294: 278: 272: 262: 256: 248: 233: 208: 207: 112: 103: 93: 86: 79: 72: 60: 48:Please help 43:verification 40: 21:Lisp machine 440:TI Explorer 369:source code 337:source code 314:Bill Gosper 275:Steven Levy 718:Categories 692:2020-10-01 508:References 428:Steve Ward 408:LMI-LAMBDA 385:head start 318:Tom Knight 202:Bankruptcy 76:newspapers 652:2 October 603:Doubleday 424:NuMachine 412:microcode 326:Symbolics 252:Symbolics 223:to build 146:Computers 106:June 2017 706:A speech 670:. Tunes. 500:and the 406:and the 143:Industry 303:. When 285:hackers 189: ( 184:Defunct 174:Founder 159: ( 151:Founded 90:scholar 609:  552:  526:NerdTV 447:Genera 347:; see 297:hacker 92:  85:  78:  71:  63:  502:Linux 420:NuBus 254:Inc. 97:JSTOR 83:books 654:2013 607:ISBN 550:ISBN 475:RISC 451:VLSI 395:and 381:CADR 316:and 244:LISP 236:CADR 199:Fate 191:1987 187:1987 161:1979 154:1979 69:news 487:GNU 259:CDC 219:'s 217:MIT 215:of 165:in 52:by 720:: 685:. 644:. 605:. 597:. 524:. 442:. 399:. 358:, 351:. 332:. 231:. 695:. 656:. 615:. 601:/ 558:. 528:. 193:) 163:) 119:) 113:( 108:) 104:( 94:· 87:· 80:· 73:· 46:. 23:.

Index

Lisp machine

verification
improve this article
adding citations to reliable sources
"Lisp Machines"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Cambridge, Massachusetts
Richard Greenblatt
Richard Greenblatt
MIT
Artificial Intelligence Laboratory
Lisp machines
Cambridge, Massachusetts
CADR
Russell Noftsker
LISP
Symbolics
CDC
Steven Levy
Hackers: Heroes of the Computer Revolution
hackers
Richard Stallman
hacker

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.