Computers


Also found in: Dictionary, Thesaurus, Medical, Financial.
Related to Computers: Best Buy, Desktop computers

Computers

(religion, spiritualism, and occult)

Spiritualists and others communicating with spirits used to work with slates, but the modern trend today is toward computers. Messages purporting to come from the spirit world have been received on personal computers. The origin is difficult to prove, however, because of the ability of some to “hack” into other’s computers.

A common practice since the earliest days of séances was to tie two blank slates together and place them in the circle. At the end of the séance these would be separated and writing would be discovered on one or both of the slates. This writing was often identified as being in the handwriting of the departed spirit and was often a message from that spirit to one of the sitters.

A modern form of slate writing might be experienced using a laptop computer. This could be set to a word processing program, with a new blank file opened. Closing up the computer (which usually turns it off), it could then be left in the center of the séance circle. At the end of the sitting the laptop could be turned on again and the file accessed. It is possible that the file would no longer be empty but would contain a message from spirit.

“Ghost writing” has appeared on computer screens in the past. In The Vertical Plane (1988), Ken Webster tells of his experience after he had moved into an old cottage in North Wales. His old Acorn desktop computer suddenly started to display messages on its screen when it was left unattended. Over a period of two years close to 300 such messages appeared, attested to by Webster’s family and friends. This was before the Internet, so there was no connection with other computers. The messages appeared to come from various sources, including a man named Tomas Harden who claimed to have lived in the cottage in the sixteenth century. The Society for Psychical Research has reportedly investigated this case but no results have been forthcoming.

Sources:

Buckland, Raymond: Buckland’s Book of Spirit Communications. St. Paul: Llewellyn, 2004
Randles, Jenny & Peter Hough: The Afterlife: An Investigation into the Mysteries of Life after Death. London: Piatkus, 1993
Webster, Ken: The Vertical Plane. London: Grafton, 1988
References in periodicals archive ?
When it comes to viruses, worms, assorted spyware and all those other unfriendly bugs that try to invade our computers, you must have guar anteed first-rate protection.
Districts sometimes refurbish computers in-house, but more likely they secure them from outside agencies that sell or donate the units to schools.
In their paper "Usable Computers for the Elderly: Applying Coaching Experiences," Laurie Kantner and Stephanie Rosenbaum note dexterity, vision, and memory as the most significant challenges to teaching seniors how to use the computer and list ways to counter these problems.
Built so far only in laboratories and on a limited scale, quantum computers exploit the quantum-mechanical properties of tiny objects, such as photons and ions, to perform calculations (SN: 1/7/06, p.
And wherever there are computers, there have to be computer programmers who write the instructions that tell the computers what to do, step by painstaking step.
Pursuant to the master license agreement, Y makes payments to X when (1) Y or its subsidiaries reproduce the licensed computer program on computers and other equipment used by Y or its subsidiaries or (2) Y or its subsidiaries reproduce and distribute X's computer program on computers and other equipment manufactured and marketed to customers by Y or its subsidiaries.
These systems set the pace for the genre of systems available on stand-alone and networked computers in the decades of the 1970s and 1980s.
However, by using computers with the removable hard disk approach mentioned above, the students can gain this experience.
Despite those differences, there are some very clear trends in computer use on campuses large and small, religious and secular, upper- and middle-class: Mobile computers such as personal digital assistants (PDAs), cell phones, laptops, and tablets are taking over as school staff and students use them to create mobile lifestyles.
An example is the widespread use of computers in preschools and elementary schools to improve sagging literacy skills.
The Internet has become a means of survival in the business world, yet computers with constant DSL or cable Internet connections are particularly susceptible to hackers.
Vanderheiden (1996) defined the term "transparent access" as the fundamental interaction technique necessary for general purpose computers, CAT devices, and software programs that are compatible and capable of running on the same operational system.

Full browser ?