9 Conclusion

So that’s it I guess. You know all about Clon now. The next step is to actually use it to clonify your favorite application, write new applications using it and contaminate the world with standalone Common Lisp programs, featuring unprecedented command-line power and thrill-a-minute option hacking.

Now, go Luke. The Attack of the Clon is ready to begin.