Macivory User's Guide Overview of Macivory

Total Page:16

File Type:pdf, Size:1020Kb

Macivory User's Guide Overview of Macivory MacIvory User’sGuide Preface MacIvory provides the benefits of symbolic processing along with the features of a Macintosh personal computer. Before using your MacIvory, read "Introduction to MacIvory Machines" (this will familiarize you with the system). Then, read the user documentation supplied by Apple, and the disk drive and monitor manufactur ers, so that you will feel confident about using the Macintosh computer, and the MacIvorysystem’scomponents. Once you are familiar with your MacIvory, its components, and the Macintosh user interface, return to this manual. Begin by reading and following the steps in "Get tingStartedwithMacIvory"topositionandpowerupyourMacIvorySystem. This book is divided into two main sections: a user’s manual and a programmer’s reference. The user’s manual can help you to get started using MacIvory, and pro vides information on some common Macivory operations. The programmer’s refer ence provides information on how to use features of the Macintosh operating sys tem from Genera and other topics for programmers who are developing MacIvory applications. Youmayalsowanttorefertothisadditionaldocumentation: • For information about adapting programs written on Symbolics 3600series ma chines to MacIvory, see the section "Porting Genera Applications to Ivory Ma chines". • For information about the Genera 8.0 software and how it differs from Genera 7.4 Ivory, see Genera 8.0 Release Notes. For information about Symbolics ma chines and the Genera software development environment, refer to the books contained within the Genera documentation set. New Symbolics users should refertothesetitlesfirst: ° Genera Workbook ° Site Operations ° Genera User’s Guide OverviewofMacIvory The MacIvory system makes Symbolics’ Genera software environment, which en ables the comprehensive development, prototyping, and delivery of applications, availabletoAppleMacintoshIIusers. Whenever possible, MacIvory maintains the Macintosh user interface paradigm for video, I/O processing and communications. The MacIvory board set plugs directly into the Macintosh II with no other system modifications required. Genera applica tionscanbe"opened"underMacOSjustlikeanyotherMacintoshwindow. Page 892 MacIvory software basically consists of two parts: Code that runs on the Ivory pro cessor and code that runs on the Macintosh. The two processors communicate with each other through a special region of memory that they both access. MacIvory has exclusive use of a memory region allocated to it by the Macintosh when the Macintosh is powered on or restarted, and the Macintosh uses the rest of memory. Allinput/output ishandledthroughtheMacintosh. OntheIvoryside,thecodeprovided(writteninLisp)consistsof: • ARemoteProcedureCall(RPC)interface. • Genera modified as necessary to use the MacOS for all input/output, including keyboard,mouse,disk,Ethernet,andconsolescreenaccesses. • IFEP code modified similarly.(The IFEP is the part of Generasoftware involved with booting and initializing a world. Historically, this code resided in readonly memory on theFront End Processor of a Symbolics machine; therefore the name IFEP,withIstandingforIvory.) OntheMacintoshside,thecodeprovided(writteninC)consistsof: • CodetoinitializetheMacIvoryandtheIFEP. • LifeSupportcoderequiredtosupportMacIvory. • A Macintosh application that allows users to access applications running on Ivory. Macintosh/IvoryCommunication Communication is based on a shared memory, readable and writable by both the guest (Ivory) and the host (Macintosh) processors. Outside of shared memory, each processor has its own memory space. This memory space is allocated to each pro cessorwhentheMacintoshIIisbooted. There is no shared disk space: The disk is partitioned into Ivory space and Macin tosh space. (Ivory disk space is further partitioned into FEP file space and Lisp Machine File Space just as it would be on a 3600 or XL400, but this is transpar enttoapplicationusers.) TherearetwolevelsofcommunicationbetweentheMacintoshandIvory: • In shared memory, a buffered channel exists between drivers on the Macintosh and on Ivory for those operations requiring maximum performance, such as disk I/Oandnetworkcommunication. • Aremoteprocedurecall(RPC)interfaceforgeneralpurposeinput/output. The host (Macintosh running MacOS) is primary in the sense that it is booted Page 893 first and the guest (Ivory), looks like just one of the several application programs that the user can run. A Macintosh application program runs when the user wants to make use of Ivory. This program boots Ivory, and gives Ivory control over the keyboard, mouse and all or part of the screen. After that, the Ivory runs continu ously, staying up between visits by the user, unless the user explicitly reboots the IvoryorrebootstheMacintosh. Communication between guest and host applications is managed by the Remote Procedure Call (RPC) protocol. The same protocol also allows Ivory to access the MacOS,andviceversa. SoftwareComponentsofMacIvory InadditiontostandardGenera,softwarecomponentsforMacIvoryinclude: • RPC,theRemoteProcedureCallfacility • The remote window facility built on RPC that allows the Genera window system to use the screen, keyboard, and mouse of the host Macintosh instead of directly manipulatinga3600seriesmachine’sownlocalscreen,keyboard,andmouse • AuserinterfacesystemthatisadaptabletoGenerastyleorMacintoshstyle • InterfacetotheMacintoshtoolbox • SupportforaccessingMacintoshfiles • SupportforMacintoshperipherals,suchasEthernet,tapeandseriallines • SupportforsomeMacintoshdataandfileformats User’sManualforMacIvory IntroductiontoMacIvoryMachines MacIvory machines integrate the Genera software environment with the Apple MacintoshII(includingitsoperatingsystemandtheToolbox)thisway: • The Genera software environment accelerates programmer productivity and pro videstheabilitytodocomplex,realworldproblemsolving. • The Macintosh offers a stylish and easytolearn user interface, along with ac cesstoawidevarietyofthirdpartyapplications. MacIvory provides full integration of these two systems; it is designed to combine theadvantagesofeach,whiledeliveringthebenefitsofboth. Page 894 MacIvory relies on the Macintosh processor for I/O services such as keyboard, dis play, and disk access. All of Macintosh’s system and toolbox entry points can be called from Lisp using Remote Procedure Calls (RPC). Additionally, Genera facili ties (Dynamic Windows, for example) use Macintosh facilities, and MacIvory makes full use of the Macintosh for graphics. This kind of integration means that exist ing Genera applications developed on the Symbolics 3600 series of machines canreadilytakeadvantageofMacintoshfeatures. MacIvory enables you to design applications that employ either the Macintosh user interface (UI), the Genera user interface, or both. Furthermore, without changing your program, you can allow end users to make their own UI choices. MacIvory doesn’t mandate a user interface style for your applications; you are free to create yourown. MacIvorySoftwareDescription MacIvorysoftwareconsistsof: Genera8.1 The Genera environment adapted to run on the Ivory proces sor; both a development and a delivery version are available. This software is contained within the Symbolics Distribution WorldandisdistributedondiskandQIC100tapes. MacIvorySupportSoftware To provide MacIvory with the basic I/O services it needs to run Genera, and to facilitate highlevel communication between the two processors by using a Remote Procedure Call (RPC) mechanism.Thissoftwareisdistributedonfloppydiskettes. GettingStartedwithMacIvory Symbolics Service Personnel will configure and install yourMacIvory System.After itisinstalled,performthesetasks: 1. Following each manufacturer’s directions to ensure that you leave appropriate clearance for cooling, position the Macintosh computer and the external disk drive(ifyoursystemisequippedwithone)convenientlyinyourworkspace. Position the 19" monitor on either side of the Macintosh II or on a stand over theMacintoshII,asthemanufacturerrecommends. Warning: Be sure to position the 19" monitor so thatthere is at least an inch between the monitor and the Macintosh II to ensure adequate ventilation and avoid overheating. Do not place the 19" monitor near heat sources such as ra diatorsorinanareasubjecttodirectsunlight. 2. Make sure that the Symbolics keyboard template has been placed over the keys. Page 895 3. Power up (plug in and turn on) the external disk drive (if your system is equipped with one) and the Macintosh computer according to each manufac- turer’s instructions. Note: At power up, you will momentarily see the Apple "Happy Mac" on your Mac intosh screen, indicating that the Macintosh is starting up from the disk drive. You will also see a symbol in the lower lefthand corner of your screen that indi catesthe presenceofpreinstalledIvory"lifesupport"softwareonthediskdrive. ControllingtheIvoryCoprocessoronaMacIvory When you first power on the Macintosh and start up an Ivory application (by dou bleclicking on the Genera icon, for example), the Ivory coprocessor is initialized, andGeneraiscoldbooted.Thismaytakeafewminutes. Once the Ivory coprocessor has been initialized and Genera has been cold booted (by the first Ivory application that needs it), you can open and quit that applica tion and other Ivory applications as quickly and easily as you do ordinary (nonIvorydependent)Macintoshapplications. When you restart the Macintosh by choosing Restart from the Special menu (avail able from the Finder), this initializes the Macintosh processor, but preserves
Recommended publications
  • Genera Workbook Using This Book Preface This Is the Document To
    Genera Workbook Using This Book Preface This is the document to read when you’re ready to sit down at your Symbol- ics computer. It teaches you the initial skills you need to use the Genera system effectively. We present concepts you need to know, as well as providing exercises andactivitiesthatturnthoseconceptsintopracticalskills. The material covered in the first group of chapters in this workbook is a pre- requisite for all Symbolics Education Services Courses. However, you can com plete the second and third sections after taking your first course. Practicing the material helpsyou learn it faster. Bring this workbook to all courses you take with Symbolics. We expect that you have used a computer before; we do not expect that you have used a Symbolics computer before. You need to learn this material whether or not you are a programmer. This is not a programming textbook. We make no assumptions about your programming background or future; this work bookisforbothprogrammersandnonprogrammers. Every time we use a term for the first time, we put it in italics. If you see a term you don’t recognize, be sure to check the glossary at the end of the work book. This workbook uses Symbolics documentation conventions and a few of its own. If you see a word or phrase enclosed in brackets, like [Help], it is a menu item.We use two different conventions withrespect to Symbolics keyboard keys: in text,thekeylabelledHELPlookslikethis: HELP butinexamplesitlookslikethis: <HELP> todifferentiateitasasinglekeystrokefromthetextaroundit. It is very important to have a Symbolics computer available so that you can work through the hands-on activities, called walk-throughs.
    [Show full text]
  • The Evolution of Lisp
    1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp.
    [Show full text]
  • Symbolics Architecture
    Symbolics Architecture David A. Moon Symbolics, Inc. W hat is an architecture? In com- languages, user interface, and operating This architecture puter systems, an architecture system. System architecture defines the rapid is a specification of an inter- product that people actually use; the other enables face. To be dignified by the name architec- levels of architecture define the mecha- development and ture, an interface should be designed for a nism underneath that implements it. Sys- long lifespan and should connect system tem architecture is implemented by soft- efficient execution of components maintained by different orga- ware; hardware only sets bounds on what large, ambitious nizations. Often an architecture is part ofa is possible. System architecture defines the product definition and defines character- motivation for most of the design choices applications. An istics on which purchasers of that product at the other levels ofarchitecture. This sec- rely, but this is not true of everything that tion is an overview of Symbolics system unconventional design is called an architecture. An architecture is architecture. avoids trading off more formal than an internal interface be- The Symbolics system presents itself to tween closely-related system components, the user through a high-resolution bitmap safety for speed. and has farther-reaching effects on system display. In addition to text and graphics, characteristics and performance. the display contains presentations of ob- A computer system typically contains jects. The user operates on the objects by many levels and types ofarchitecture. This manipulating the presentations with a article discusses three architectures de- mouse. The display includes a continuous- fined in Symbolics computers: ly updated reminder of the mouse com- (1) System architecture-defines how mands applicable to the current context.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • A Lisp Oriented Architecture by John W.F
    A Lisp Oriented Architecture by John W.F. McClain Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Master of Science in Electrical Engineering and Computer Science and Bachelor of Science in Electrical Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 1994 © John W.F. McClain, 1994 The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author ...... ;......................... .............. Department of Electrical Engineering and Computer Science August 5th, 1994 Certified by....... ......... ... ...... Th nas F. Knight Jr. Principal Research Scientist 1,,IA £ . Thesis Supervisor Accepted by ....................... 3Frederic R. Morgenthaler Chairman, Depattee, on Graduate Students J 'FROM e ;; "N MfLIT oARIES ..- A Lisp Oriented Architecture by John W.F. McClain Submitted to the Department of Electrical Engineering and Computer Science on August 5th, 1994, in partial fulfillment of the requirements for the degrees of Master of Science in Electrical Engineering and Computer Science and Bachelor of Science in Electrical Engineering Abstract In this thesis I describe LOOP, a new architecture for the efficient execution of pro- grams written in Lisp like languages. LOOP allows Lisp programs to run at high speed without sacrificing safety or ease of programming. LOOP is a 64 bit, long in- struction word architecture with support for generic arithmetic, 64 bit tagged IEEE floats, low cost fine grained read and write barriers, and fast traps. I make estimates for how much these Lisp specific features cost and how much they may speed up the execution of programs written in Lisp.
    [Show full text]
  • CLX — Common LISP X Interface
    CLX Common LISP X Interface 1988, 1989 Texas Instruments Incorporated Permission is granted to any individual or institution to use, copy, modify and distribute this document, provided that this complete copyright and permission notice is maintained, intact, in all copies and supporting documentation. Texas Instruments Incorporated makes no representations about the suitability of this document or the software described herein for any purpose. It is provided ”as is” without express or implied warranty. CLX Programmer’s Reference i ACKNOWLEDGMENTS Primary Interface Author: Robert W. Scheifler MIT Laboratory for Computer Science 545 Technology Square, Room 418 Cambridge, MA 02139 [email protected] Primary Implementation Author: LaMott Oren Texas Instruments PO Box 655474, MS 238 Dallas, TX 75265 [email protected] Design Contributors: Dan Cerys, BBN Scott Fahlman, CMU Kerry Kimbrough, Texas Instruments Chris Lindblad, MIT Rob MacLachlan, CMU Mike McMahon, Symbolics David Moon, Symbolics LaMott Oren, Texas Instruments Daniel Weinreb, Symbolics John Wroclawski, MIT Richard Zippel, Symbolics Documentation Contributors: Keith Cessna, Texas Instruments Kerry Kimbrough, Texas Instruments Mike Myjak LaMott Oren, Texas Instruments Dan Stenger, Texas Instruments The X Window System is a trademark of MIT. UNIX is a trademark of AT&T Bell Laboratories. ULTRIX, ULTRIX–32, ULTRIX–32m, ULTRIX–32w, and VAX/VMS are trademarks of Digital Equipment Corporation. ii CLX Programmer’s Reference CONTENTS Section Title 1 INTRODUCTION TO CLX 2 DISPLAYS 3 SCREENS 4 WINDOWS AND PIXMAPS 5 GRAPHICS CONTEXTS 6 GRAPHIC OPERATIONS 7 IMAGES 8 FONTS AND CHARACTERS 9 COLORS 10 CURSORS 11 ATOMS, PROPERTIES, AND SELECTIONS 12 EVENTS AND INPUT 13 RESOURCES 14 CONTROL FUNCTIONS 15 EXTENSIONS 16 ERRORS A PROTOCOL VS.
    [Show full text]
  • Genera User's Guide Overview of Symbolics Computers
    Genera User’s Guide Overview of Symbolics Computers Documentation Notation Conventions Modifier Key Conventions Modifier keys are designed to be held down while pressing other keys. They do not themselves transmit characters. A combined keystroke like META-X is pronounced "meta x" and written as m-X.This notation means thatyou press the META key and, whileholdingitdown,presstheXkey. Modifierkeysareabbreviatedasfollows: CONTROL c- META m- SUPER s- HYPER h- SHIFT sh- SYMBOL sy- Modifier keys can be used in combination, as well as singly.Forexample, the nota tion c-m-Y indicates that you should hold down both the CONTROL and the META keyswhilepressingY. Modifier keys can also be used, both singly and in combination, to modify mouse commands. For example, the notation sh-Left means hold down the SHIFT key while clicking Left on the mouse and c-m-Middle means hold down CONTROL and METAwhileclickingMiddle. The keys with white lettering (like X or SELECT) all transmit characters. Combina tions of these keys should be pressed in sequence, one after the other (for exam ple, SELECT L). This notation means that you press the SELECT key, release it, and thenpresstheLkey. LOCAL is an exception to this rule. Despite its white lettering, you must hold it down while pressing another key, or it has no effect. For example, to brighten the imageonyourmonitor,youwouldholddown LOCALwhilepressingB. Page 2736 Documentation Conventions Thisdocumentationusesthefollowingnotationconventions: cond,zl:hostat PrintedrepresentationofLispobjectsinrunningtext. RETURN,ABORT,c-F keysontheSymbolicsKeyboard. SPACE Spacebar. login Literaltypein. (make-symbol "foo") Lispcodeexamples. (function-name arg1 &optionalarg2) Syntaxdescriptionoftheinvocationoffunction-name. arg1 Argument to the function function-name, usually ex pressed as a word that reflects the type of argument (forexample,string).
    [Show full text]
  • Genera Concepts Genera the Best Software Environment Available
    Genera Concepts Genera The Best Software Environment Available To allournewusers:Welcome. This conceptual introduction explains what your Symbolics computer is all about. We urge you to at least skim it before you start daily work with the system. We try here to summarize some of the "big picture" concepts in your new software environment; knowing about this framework will help you in learning its details moreefficiently. Most new users of Symbolics machines have worked on traditional timesharing systems, such as VAX/VMS, or on microcomputers or conventional UNIX worksta tions. ("Genera Comparison Charts" shows some equivalents between these systems and Genera.) If you feel somewhat uneasy about learning how to use the most ad vancedsoftwareenvironmentaround,relax! You don’t have to learn everything at once in order to do anything look at this as a longterm, incrementallearning project. You don’t have to learn everything by yourself.OurdocumentationandGeneraitselfareheretohelpyou. Genera and Symbolics Common Lisp dramatically increase your productivity and efficiency by providing many builtin software facilities (similar to library routines) that you would otherwise have to write yourself. Our editcompiledebug cycle hap pens so fast that you are virtually editing, compiling, and debugging simultaneous ly. The editor, compiler and debugger are all resident utilities, available anytime, anywhere. Lisp Your Editor Mail Listener Application Figure173.YourviewofGenera’scommandlevel. Page 2926 "command levels" or separate "commandenvironments;" you can get Genera has no there from here. You can move directly from any application to any other applica tion, usually with just two keystrokes. You do not have to close one application to enteranother.(SeeFigure173.) Many different activities, such as the editor and electronic mail, run at the same time in separate processes.
    [Show full text]
  • Common Lisp Object System
    Common Lisp Object System by Linda G. DeMichiel and Richard P. Gabriel Lucid, Inc. 707 Laurel Street Menlo Park, California 94025 (415)329-8400 [email protected] [email protected] with Major Contributions by Daniel Bobrow, Gregor Kiczales, and David Moon Abstract The Common Lisp Object System is an object-oriented system that is based on the concepts of generic functions, multiple inheritance, and method combination. All objects in the Object System are instances of classes that form an extension to the Common Lisp type system. The Common Lisp Object System is based on a meta-object protocol that renders it possible to alter the fundamental structure of the Object System itself. The Common Lisp Object System has been proposed as a standard for ANSI Common Lisp and has been tentatively endorsed by X3J13. Common Lisp Object System by Linda G. DeMichiel and Richard P. Gabriel with Major Contributions by Daniel Bobrow, Gregor Kiczales, and David Moon 1. History of the Common Lisp Object System The Common Lisp Object System is an object-oriented programming paradigm de- signed for Common Lisp. Over a period of eight months a group of five people, one from Symbolics and two each from Lucid and Xerox, took the best ideas from CommonLoops and Flavors, and combined them into a new object-oriented paradigm for Common Lisp. This combination is not simply a union: It is a new paradigm that is similar in its outward appearances to CommonLoops and Flavors, and it has been given a firmer underlying semantic basis. The Common Lisp Object System has been proposed as a standard for ANSI Common Lisp and has been tentatively endorsed by X3J13.
    [Show full text]
  • Selected Essays of Richard M. Stallman
    Free Software, Free Society: Selected Essays of Richard M. Stallman Introduction by Lawrence Lessig Edited by Joshua Gay GNU Press www.gnupress.org Free Software Foundation Boston, MA USA First printing, first edition. Copyright © 2002 Free Software Foundation, Inc. ISBN 1-882114-98-1 Published by the Free Software Foundation 59 Temple Place Boston, MA Tel: 1-617-542-5942 Fax: 1-617-542-2652 Email: [email protected] Web: www.gnu.org GNU Press is an imprint of the FSF. Email: [email protected] Web: www.gnupress.org Please contact the GNU Press for information regarding bulk purchases for class- room or user group use, reselling, or any other questions or comments. Original artwork by Etienne Suvasa. Cover design by Jonathan Richard. Permission is granted to make and distribute verbatim copies of this book provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute translations of this book into another language, from the original English, with respect to the conditions on distribution of modified versions above, provided that it has been approved by the Free Software Foundation. i Short Contents Editor’s Note................................................ 1 A Note on Software .......................................... 3 Topic Guide ................................................ 7 Introduction ............................................... 11 Section One ............................................... 15 1 The GNU Project ....................................... 17 2 The GNU Manifesto ..................................... 33 3 Free Software Definition ................................. 43 4 Why Software Should Not Have Owners ..................... 47 5 What’s in a Name? ...................................... 53 6 Why “Free Software” is Better than “Open Source” ............ 57 7 Releasing Free Software if You Work at a University ........... 63 8 Selling Free Software ...................................
    [Show full text]
  • The Symbolics Virtual Lisp Machine Or Using the Dec Alpha As a Programmable Micro-Engine1
    THE SYMBOLICS VIRTUAL LISP MACHINE OR USING THE DEC ALPHA AS A PROGRAMMABLE MICRO-ENGINE 1 (EXTENDED ABSTRACT) P.T. Withington, Scott McKay, Gary Palter 2 Symbolics Inc. 6 Concord Farms Concord, MA 01742-2727, U.S.A. [email protected] 1+ 508 287 1000 Paul Robertson 2 Dynamic Object Language Group 2 Parsonage Hill Haverhill, MA 01832, U.S.A. specifically to execute the Lisp language. INTRODUCTION12 Because of the limited market, this custom hardware has never been able to take advantage Symbolics’ Genera system represents the accu- of cutting-edge technology such as is available mulation of nearly three and a half decades of in commodity, RISC-based workstations. At the software engineering tools, written in several same time, non-standard hardwares such as the dialects of the Lisp language and several object- Lisp Machine have fallen into economic oriented extensions to Lisp. Traditionally, disfavor. Nonetheless, Lisp’s (and the Lisp Genera has run on a “Lisp Machine”, a line of Machine’s) capability in prototyping, evolu- custom hardware workstations designed tionary problem solving, and super-complex problems has retained a small but dedicated market. 1Symbolics® and Genera® are registered trademarks and Virtual Lisp Machine™ and VLM™ are trademarks of In response to market pressure to provide Symbolics, Inc. DEC® is a registered trademark and Genera’s capabilities on commodity hardware, Alpha™ and AXP™ are trademarks of Digital Equipment Corporation. Symbolics chose to implement an “emulator” that would execute the Lisp Machine instruction 2Author’s electronic mail addresses are ptw@Riverside. set on a standard platform, rather than to port the SCRC.Symbolics.COM, [email protected].
    [Show full text]
  • Object Oriented Programming (OOP) Imperative Programming
    Object Oriented Programming (OOP) IIIA o New programming paradigm o Actions Æ Objects o Objects Å Actions o Object-oriented = Objects + Classes + Inheritance TAPIA 2005-2006 Imperative programming IIIA o OOP (Object-Oriented Programming) related o Local state, delegation, inheritance o History (Norvig,465): Algol 60 Æ SIMULA o Lisp extensions: o Smalltalk (69) o Flavors (79) o New Flavors (81) o Common Loops (88) o CLOS (91): standard TAPIA 2005-2006 History IIIA Dahl 1966 Algol60 Simula Classes single inheritance Nygaard LISP world Kay 1969 Smalltalk Goldberg Ingalls Steele 1976 LAMBDA Cannon 1979 Flavors multiple inheritance method combination Weinreb Symbolics 1981 New Flavors generic functions Xerox 1982 CommonLoops multimethods AT&T 1986 C++ Bell labs Meyer 1988 Oaklisp Eiffel Lang 1988 Perlmutter CLOS Steele 1991 JAVA TAPIA 2005-2006 AOP vs. OOP (Shoham) IIIA OOP AOP Basic unit Object (passive) Agent (active) State without restriction belief, commitment, competence, preferences, … Computation Message passing, methods Message passing, methods Type of messages without restriction Inform, request, offer, promise, reject, … Message no Honesty, consistency, rationality, restrictions … TAPIA 2005-2006 Nomenclature IIIA o Object: encapsulated local state and behavior o Class: describes similar objects with the same behavior and structure. o Instance: object belonging to a class. o Class Variable: variable shared by all the members of a class. o Instance Variable: encapsulated variable of an object. o Generic Function: its behavior depends on the types or classes of the arguments. TAPIA 2005-2006 Nomenclature IIIA o Message: Action name. Equivalent to a generic function. o Method: Specialization of a generic function. o Delegation: an object passes a task to another object.
    [Show full text]