The Lisp Machine: Noble Experiment Or Fabulous Failure?

Total Page:16

File Type:pdf, Size:1020Kb

The Lisp Machine: Noble Experiment Or Fabulous Failure? THE LISP MACHINE: NOBLE EXPERIMENT OR FABULOUS FAILURE? P. T. Withington Symbolics, Inc. The “Lisp Machine”, a custom computer oriented programming, integrated pro- work-station designed specifically for the gramming environments, computer music, execution of Lisp, has been an important integrated-circuit design, and of course part of the Lisp tradition for 20 years. Artificial Intelligence (AI). Recently, the Lisp Machine has been depre- cated in view of the demise of many Lisp But, Lisp’s purity did not come without a Machine vendors, the swing towards stan- price. The choice by many languages to dardization, and the advances that reduced expose implementational limitations is often instruction set (RISC) architectures have a choice of efficiency. The speed of the brought. But rumors of its death are greatly normal case is optimized at the risk of the exaggerated. abnormal case going undetected. Lisp, on the other hand, guarantees the unusual as Unlike most commercial computer lan- well as the usual will be dealt with uni- guages, Lisp has always been a language of formly. It must always be on its guard: ideals. Its roots are in the theory of lambda- every operation must be checked for excep- calculus. Whereas other languages burden tions. As a consequence, Lisp on conven- the programmer with implementational gaps tional machines has historically been pon- in their abstractions, Lisp has always had the derous to work with. aim of supporting complete abstractions.1 This idealistic bent of Lisp has led to it often In the early 1970’s several groups of being the language of choice for computer- researchers utilized two novel hardware oriented research in universities and indus- technologies to improve the efficiency of try. Removing the more mundane difficul- Lisp: tagged architectures and micro- ties of computer programming allowed programming. Tagged architectures store researchers to experiment with super- type information with each data word, complex (at the time) technologies such as tracking dynamically changing types (a windowing, presentation managers, object- prominent feature of the Lisp language) with essentially no overhead. Micro-program- ming allows a simpler compiler by imple- 1For example, in ‘C’ the answer to (1-2/3)*3 is either menting complex instructions that more 3 (!) or perhaps 0.99999994, in Lisp it is 1; in ‘C’ the closely match the high-level semantics of answer to 2147483647+2147483647 is -2 (!), in Lisp the Lisp language. Experimenting with it is 4294967294. Because ‘C’ is transparent to imple- these techniques eventually led to commer- mentation detail, it may be that some ‘C’ implementa- cial introductions of “Lisp Machines”. tions will give the right answer (or a different wrong answer) for these particular examples; nonetheless, the programmer’s task is often more difficult because of Other novel features of these machines this transparency. Lisp also has finite limits in its include: implementation, but they are usually large enough to not be of practical importance. 2THE LISP MACHINE • The “stack cache”— Execution of Lisp was eventually taken public. Xerox and is stack-oriented. By caching the top Texas Instruments (TI) also entered the elements of the stack, efficiency market. As late as 1986, Integrated Infer- approaching that of register-based ence Machines (IIM) entered the Lisp execution is achieved without complex Machine market. Computer science register allocation algorithms in the researchers, eager to speed their experi- compiler. The stack cache also supports ments, snapped up the machines. Com- fast function call and return, as if the panies bought them for their R&D labs in function arguments and values are hopes of solving a wide array of problems passed in registers. from analyzing stock trades, to interpreting seismological data, to scheduling airlines, to • Garbage-collection support— Lisp’s evaluating loan applications. At the time, storage management system is often Lisp Machines were the only computer implemented as a “garbage collector”, work-station of significant power and the which automatically reclaims unused only economic solution to efficiently devel- objects. The Lisp Machine virtual oping and running Lisp programs. memory hardware, in concert with the type tags, tracks object-reference loads The Lisp Machines produced by these com- and stores so the software can determine panies went through several evolutionary quickly which objects are in use and generations: starting at the high price of efficiently reclaim those that are not. $150,000 and implemented in TTL in a box rivalling the VAX/780 in size and power • Instruction emulation— When the Lisp consumption2 and eventually being deliv- Machine hardware encounters an ered as 1- or 2-chip VLSI implementations exceptional situation (for example, an on $10,000 add-in boards for the Apple integer arithmetic operation that exceeds MacIntosh. With this latest generation of the hardware imposed implementation Lisp Machines, Symbolics was satisfied that limit or an operation on a software- its instruction set had evolved sufficiently to defined type) the hardware traps out to a commit it to mask-programmed ROM. software “emulator” subroutine. This However, the small size of the market for subroutine implements the full these machines has meant they are unable to semantics of the operation, as specified take advantage of the cutting-edge hardware by Lisp, as though it is being handled by technology of commodity machines. They the machine instruction. always lag by a few generations, where design and production costs are more Early Lisp Machines implemented their reasonable. micro-programmed architectures with a writable control store, which meant the Initially, the small companies received great instruction set, and to a certain extent other exposure in the popular press. Because they architectural features of the machine, could represented a “pure play”3 in AI, they were be changed by simply writing, compiling, the darlings of Wall Street. But today, only and loading new micro-code. This flexi- bility led to further experimentation and evolution of the hardware support for Lisp. 2It is amusing to realize that a machine of this size and price was ever considered a work-station. In the late 70’s and early 80’s both AI and 3 the Lisp Machine enjoyed a brief but heady An investment term meaning the company is in a vogue. Two small companies, Symbolics single market and can be expected to track that mar- ket’s fortunes more closely than a diversified company and Lisp Machines, Inc. (LMI), were might. founded to build Lisp Machines; Symbolics 11 JULY 1991 DRAFT P. T. WITHINGTON 3 Symbolics remains in the market trying to Machines attracted top-notch talent and sell Lisp Machine work-stations, at about funded innovative research in many areas of 1/6 the size of its heyday. The popular computer science, both hardware and opinion is that AI technology was oversold software. and lost its credibility; while at the same time, Unix was rising to meet the need for However, the Lisp language did suffer in the standards and RISC computers, with their commercial market from its association with simple instructions that can be executed at what many customers have come to regard fantastic rates, obviated the need for a cus- as the “snake oil” of AI. Because its only tom machine to implement Lisp. The press perceived redeeming value was to run Lisp, was as quick to damn the Lisp Machine the Lisp Machine suffered doubly so. companies as it had been to praise them, Despite the grim appearance of the future of when they did not meet over-inflated the Lisp Machine, there remain small groups expectations. of zealots who will not part with their Lisp machines without a fight. They battle A more charitable interpretation of the same “MIS” departments and often end up closet- facts might be that the Lisp Machine market ing their Lisp Machines, so they won’t be (by its esoteric nature) is small, and given pestered about their non-approved normal start-up statistics, is doing surpris- equipment. ingly well. The Lisp Machine was a pioneer in the early days of work-station technology. It has been argued that while Lisp may rep- It had the now standard high-resolution bit- resent the ideal solution to a problem, the mapped display, mouse pointing device, ideal solution is not always the economic large virtual memory and local disk; it even solution, even more so when it requires a had 16-bit digital stereo sound! Some of custom machine to run it. Today, there is a these innovations contributed to the evolu- wide choice of general-purpose computer tion of Lisp and its associated technologies. work-stations of similar power to the Lisp Unfortunately, the similarity of these fea- Machine, most with competitive Lisp tures to those eventually found on general- implementations. Many of the software purpose work-stations led to confusion over technologies that were considered research what the market for the Lisp Machine was. areas when the Lisp Machine was The exotic features of the Lisp Machine that introduced have been codified to the point made it ideal for running Lisp and the that they are amenable to implementations dream-machine of many computer using commodity software and hardware. researchers had little or no value in the Others will follow. This trend has led many general-purpose market. The success it to believe there is no longer a need for the enjoyed as a Lisp engineering work-station power of Lisp and even less a need for the faltered at attempts to market it as a Lisp Machine. What is often not computer-aided software engineering considered, however, is whether these (CASE) work-station. technologies would be where they are today (or would have been explored at all) in the At the very least, one can say that the Lisp absence of the Lisp Machine.
Recommended publications
  • Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract
    MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLI..IGENCE LABORATORY WORKING PAPER 235 7 September 1982 Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract This document describes the computing facilities at the M.I.T. Artificial Intelligence Laboratory, and explains how to get started using them. It is intended as an orientation document for newcomers to the lab, and will be updated by the author from time to time. A.I. Laboratory Working Papers are produced for internal circulation. and may contain information that is, for example, too preliminary or too detailed for formal publication. It is not intended that they should be considered papers to which reference can be made in the literature. a MASACHUSETS INSTITUTE OF TECHNOLOGY 1982 Getting Started Table of Contents Page i Table of Contents 1. Introduction 1 1.1. Lisp Machines 2 1.2. Timesharing 3 1.3. Other Computers 3 1.3.1. Field Engineering 3 1.3.2. Vision and Robotics 3 1.3.3. Music 4 1,3.4. Altos 4 1.4. Output Peripherals 4 1.5. Other Machines 5 1.6. Terminals 5 2. Networks 7 2.1. The ARPAnet 7 2.2. The Chaosnet 7 2.3. Services 8 2.3.1. TELNET/SUPDUP 8 2.3.2. FTP 8 2.4. Mail 9 2.4.1. Processing Mail 9 2.4.2. Ettiquette 9 2.5. Mailing Lists 10 2.5.1. BBoards 11 2.6. Finger/Inquire 11 2.7. TIPs and TACs 12 2.7.1. ARPAnet TAC 12 2.7.2. Chaosnet TIP 13 3.
    [Show full text]
  • The Evolution of Lisp
    1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp.
    [Show full text]
  • Programming Languages As Operating Systems (Or Revenge of the Son of the Lisp Machine)
    Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine) Matthew Flatt Robert Bruce Findler Shriram Krishnamurthi Matthias Felleisen Department of Computer Science∗ Rice University Houston, Texas 77005-1892 Abstract reclaim the program’s resources—even though the program and DrScheme share a single virtual machine. The MrEd virtual machine serves both as the implementa- To address this problem, MrEd provides a small set of tion platform for the DrScheme programming environment, new language constructs. These constructs allow a program- and as the underlying Scheme engine for executing expres- running program, such as DrScheme, to run nested programs sions and programs entered into DrScheme’s read-eval-print directly on the MrEd virtual machine without sacrificing loop. We describe the key elements of the MrEd virtual control over the nested programs. As a result, DrScheme machine for building a programming environment, and we can execute a copy of DrScheme that is executing its own step through the implementation of a miniature version of copy of DrScheme (see Figure 1). The inner and middle DrScheme in MrEd. More generally, we show how MrEd de- DrSchemes cannot interfere with the operation of the outer fines a high-level operating system for graphical programs. DrScheme, and the middle DrScheme cannot interfere with the outer DrScheme’s control over the inner DrScheme. 1 MrEd: A Scheme Machine In this paper, we describe the key elements of the MrEd virtual machine, and we step through the implementation The DrScheme programming environment [10] provides stu- of a miniature version of DrScheme in MrEd.
    [Show full text]
  • Performance Comparison of the Window Systems of Two LISP Machines
    A Performance Comparison of the Window Systems of Two LISP Machines Ramin Zabih Raj Jain Massachusetts Institute o fTechnology Digital Equipment Corp. Department ofEE & CS 77 Reed Road (HLO2-3/N03) Cambridge, MA 02139 Hudson, MA 01749 We chose total elapsed time as our performance metric. EXTENDED ABSTRACT Elapsed time is also referred to as response time. We ran 1000 We have constructed a workload for comparing window trials ofour workload on a 3600 running Release 5 software with 1 system performance of different computers. It consists of key Megabyte of physical memory and on a CADR running release 4.5 operations that window systems should universally provide. We software with 386 Kbytes of memory. The results of our tests are have used this workload to measure the performance of a the reported in Table 1. Using the p2 algorithm [2],we also calculated Symbolics ZetaLisp window system on two Lisp Machines, the the fifth and ninety-fifth percentiles for the results. In addition, 3600 [3,4] and the CADR [ 1 ]. we have listed the median and the mean. The workload consists of repeating a sequence of operations Table 1: Time in milliseconds is shown as tl/t2,where t I is time (which we call a run) many times. Each run starts by creating a for 3600, t2 is the time for CADR. test window, and proceeds to perform various operations on the window in the order below. Finally, the test window is deleted. Operation 95_.....% 5% Median Mean The details of the operations performed in an individual run of the CREATE 60/70 10/40 20/50 21.8/48.5 workload follow.
    [Show full text]
  • Symbolics Architecture
    Symbolics Architecture David A. Moon Symbolics, Inc. W hat is an architecture? In com- languages, user interface, and operating This architecture puter systems, an architecture system. System architecture defines the rapid is a specification of an inter- product that people actually use; the other enables face. To be dignified by the name architec- levels of architecture define the mecha- development and ture, an interface should be designed for a nism underneath that implements it. Sys- long lifespan and should connect system tem architecture is implemented by soft- efficient execution of components maintained by different orga- ware; hardware only sets bounds on what large, ambitious nizations. Often an architecture is part ofa is possible. System architecture defines the product definition and defines character- motivation for most of the design choices applications. An istics on which purchasers of that product at the other levels ofarchitecture. This sec- rely, but this is not true of everything that tion is an overview of Symbolics system unconventional design is called an architecture. An architecture is architecture. avoids trading off more formal than an internal interface be- The Symbolics system presents itself to tween closely-related system components, the user through a high-resolution bitmap safety for speed. and has farther-reaching effects on system display. In addition to text and graphics, characteristics and performance. the display contains presentations of ob- A computer system typically contains jects. The user operates on the objects by many levels and types ofarchitecture. This manipulating the presentations with a article discusses three architectures de- mouse. The display includes a continuous- fined in Symbolics computers: ly updated reminder of the mouse com- (1) System architecture-defines how mands applicable to the current context.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • A Lisp Oriented Architecture by John W.F
    A Lisp Oriented Architecture by John W.F. McClain Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Master of Science in Electrical Engineering and Computer Science and Bachelor of Science in Electrical Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 1994 © John W.F. McClain, 1994 The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author ...... ;......................... .............. Department of Electrical Engineering and Computer Science August 5th, 1994 Certified by....... ......... ... ...... Th nas F. Knight Jr. Principal Research Scientist 1,,IA £ . Thesis Supervisor Accepted by ....................... 3Frederic R. Morgenthaler Chairman, Depattee, on Graduate Students J 'FROM e ;; "N MfLIT oARIES ..- A Lisp Oriented Architecture by John W.F. McClain Submitted to the Department of Electrical Engineering and Computer Science on August 5th, 1994, in partial fulfillment of the requirements for the degrees of Master of Science in Electrical Engineering and Computer Science and Bachelor of Science in Electrical Engineering Abstract In this thesis I describe LOOP, a new architecture for the efficient execution of pro- grams written in Lisp like languages. LOOP allows Lisp programs to run at high speed without sacrificing safety or ease of programming. LOOP is a 64 bit, long in- struction word architecture with support for generic arithmetic, 64 bit tagged IEEE floats, low cost fine grained read and write barriers, and fast traps. I make estimates for how much these Lisp specific features cost and how much they may speed up the execution of programs written in Lisp.
    [Show full text]
  • Basic Lisp Techniques
    Basic Lisp Techniques David J. Cooper, Jr. February 14, 2011 ii 0Copyright c 2011, Franz Inc. and David J. Cooper, Jr. Foreword1 Computers, and the software applications that power them, permeate every facet of our daily lives. From groceries to airline reservations to dental appointments, our reliance on technology is all-encompassing. And, it’s not enough. Every day, our expectations of technology and software increase: • smart appliances that can be controlled via the internet • better search engines that generate information we actually want • voice-activated laptops • cars that know exactly where to go The list is endless. Unfortunately, there is not an endless supply of programmers and developers to satisfy our insatiable appetites for new features and gadgets. Every day, hundreds of magazine and on-line articles focus on the time and people resources needed to support future technological expectations. Further, the days of unlimited funding are over. Investors want to see results, fast. Common Lisp (CL) is one of the few languages and development options that can meet these challenges. Powerful, flexible, changeable on the fly — increasingly, CL is playing a leading role in areas with complex problem-solving demands. Engineers in the fields of bioinformatics, scheduling, data mining, document management, B2B, and E-commerce have all turned to CL to complete their applications on time and within budget. CL, however, no longer just appropriate for the most complex problems. Applications of modest complexity, but with demanding needs for fast development cycles and customization, are also ideal candidates for CL. Other languages have tried to mimic CL, with limited success.
    [Show full text]
  • ' MACSYMA Users' Conference
    ' MACSYMA Users'Conference Held at University of California Berkeley, California July 27-29, 1977 I TECH LIBRARY KAFB, NY NASA CP-2012 Proceedings of the 1977 MACSYMA Users’ Conference Sponsored by Massachusetts Institute of Technology, University of California at Berkeley, NASA Langley Research Center and held at Berkeley, California July 27-29, 1977 Scientific and TechnicalInformation Office 1977 NATIONALAERONAUTICS AND SPACE ADMINISTRATION NA5A Washington, D.C. FOREWORD The technical programof the 1977 MACSPMA Users' Conference, held at Berkeley,California, from July 27 to July 29, 1977, consisted of the 45 contributedpapers reported in.this publicationand of a workshop.The work- shop was designed to promote an exchange of information between implementers and users of the MACSYMA computersystem and to help guide future developments. I The response to the call for papers has well exceeded the early estimates of the conference organizers; and the high quality and broad ra.ngeof topics of thepapers submitted has been most satisfying. A bibliography of papers concerned with the MACSYMA system is included at the endof this publication. We would like to thank the members of the programcommittee, the many referees, and the secretarial and technical staffs at the University of California at Berkeley and at the Laboratory for Computer Science, Massachusetts Instituteof Technology, for shepherding the many papersthrough the submission- to-publicationprocess. We are especiallyappreciative of theburden. carried by .V. Ellen Lewis of M. I. T. for serving as expert in document preparation from computer-readableto camera-ready copy for several papers. This conference originated as the result of an organizing session called by Joel Moses of M.I.T.
    [Show full text]
  • The LOOPS Project (1982-1986)
    Programming Languges Programming Languages -- The LOOPS Project (1982-1986) Main Participants: Daniel Bobrow, Sanjay Mittal, Stanley Lanning, and Mark Stefik. The LOOPS (Lisp Object-Oriented Language) project was started to support development of expert systems project at PARC. We wanted a language that had many of the features of frame languages, such as objects, annotated values, inheritance, and attached procedures. We drew heavily on Smalltalk-80, which was being developed next door. Bobrow and Stefik had done frame languages before (KRL and UNITS, respectively). KRL was one of the first frame languges ever and established the paradigm. Units was part of a doctoral dissertation, was heavily used at Stanford, and was subsequently developed by Intellicorp to become KEE. Loops was a multiple-paradigm extension to Interlisp-D. It had ● Object-oriented programming. (Classes and objects, class variables, instance variables, methods, multiple-inheritance, interactive class browsers) ● Access-oriented programming. Nestable active values that can be attached to instance variables. Whenever a program puts a value to an instance variable or gets a value from an instance variable to which active values are attached, procedures specified in the active value are triggered. Active values also enabled attaching lists of property values to instance variables. This was used for creating audit trails and other things. ● Rule-oriented programming. A simple forward-chaining rule language with facilities for leaving an audit trail via active values. Loops provided "gauges" that could be used for debugging and for monitoring in simulation programs. Gauges were LOOPS objects. They could be attached to any value of any object in the system and provide a visual indication of program activity.
    [Show full text]
  • History of the Lisp Language
    History of the Lisp Language History of the Lisp Language The following information is derived from the history section of dpANS Common Lisp. Lisp is a family of languages with a long history. Early key ideas in Lisp were developed by John McCarthy during the 1956 Dartmouth Summer Research Project on Artificial Intelligence. McCarthy’s motivation was to develop an algebraic list processing language for artificial intelligence work. Implementation efforts for early dialects of Lisp were undertaken on the IBM 704, the IBM 7090, the Digital Equipment Corporation (DEC) PDP−1, the DEC PDP−6, and the PDP−10. The primary dialect of Lisp between 1960 and 1965 was Lisp 1.5. By the early 1970’s there were two predominant dialects of Lisp, both arising from these early efforts: MacLisp and Interlisp. For further information about very early Lisp dialects, see The Anatomy of Lisp or Lisp 1.5 Programmer’s Manual. MacLisp improved on the Lisp 1.5 notion of special variables and error handling. MacLisp also introduced the concept of functions that could take a variable number of arguments, macros, arrays, non−local dynamic exits, fast arithmetic, the first good Lisp compiler, and an emphasis on execution speed. For further information about Maclisp, see Maclisp Reference Manual, Revision 0 or The Revised Maclisp Manual. Interlisp introduced many ideas into Lisp programming environments and methodology. One of the Interlisp ideas that influenced Common Lisp was an iteration construct implemented by Warren Teitelman that inspired the loop macro used both on the Lisp Machines and in MacLisp, and now in Common Lisp.
    [Show full text]
  • Genera User's Guide Overview of Symbolics Computers
    Genera User’s Guide Overview of Symbolics Computers Documentation Notation Conventions Modifier Key Conventions Modifier keys are designed to be held down while pressing other keys. They do not themselves transmit characters. A combined keystroke like META-X is pronounced "meta x" and written as m-X.This notation means thatyou press the META key and, whileholdingitdown,presstheXkey. Modifierkeysareabbreviatedasfollows: CONTROL c- META m- SUPER s- HYPER h- SHIFT sh- SYMBOL sy- Modifier keys can be used in combination, as well as singly.Forexample, the nota tion c-m-Y indicates that you should hold down both the CONTROL and the META keyswhilepressingY. Modifier keys can also be used, both singly and in combination, to modify mouse commands. For example, the notation sh-Left means hold down the SHIFT key while clicking Left on the mouse and c-m-Middle means hold down CONTROL and METAwhileclickingMiddle. The keys with white lettering (like X or SELECT) all transmit characters. Combina tions of these keys should be pressed in sequence, one after the other (for exam ple, SELECT L). This notation means that you press the SELECT key, release it, and thenpresstheLkey. LOCAL is an exception to this rule. Despite its white lettering, you must hold it down while pressing another key, or it has no effect. For example, to brighten the imageonyourmonitor,youwouldholddown LOCALwhilepressingB. Page 2736 Documentation Conventions Thisdocumentationusesthefollowingnotationconventions: cond,zl:hostat PrintedrepresentationofLispobjectsinrunningtext. RETURN,ABORT,c-F keysontheSymbolicsKeyboard. SPACE Spacebar. login Literaltypein. (make-symbol "foo") Lispcodeexamples. (function-name arg1 &optionalarg2) Syntaxdescriptionoftheinvocationoffunction-name. arg1 Argument to the function function-name, usually ex pressed as a word that reflects the type of argument (forexample,string).
    [Show full text]