So that’s it I guess. You know all about Clon
now. The next step is
to actually use it to clonify your favorite application, write new
applications using it and contaminate the world with standalone Common Lisp
programs, featuring unprecedented command-line power and thrill-a-minute
option hacking.
Now, go Luke. The Attack of the Clon
is ready to begin.