Archive Search

  • Lila Moore is a pioneering artist, filmmaker, screen choreographer, networked performance and mixed reality creator. She holds a practice-based PhD in Dance on Screen from Middlesex University (2001, UK) in the context of modern and contemporary
  • Goldberg, Ken and Karl Bohringer and Ron Fearing. MicroAssembly In Handbook of Industrial Robotics, edited by S. NofHoboken, NY: John Wiley and Sons Ltd., 1999.
  • Bio-Biblion is the library of life. There are medical books, personnal objects mixed whith eletronical screens. One slide image appears and disappears on the wall. Just like memories which come and go. And one bowl with blood moving in the middle of
  • Moore, Lila. Techno-Spiritual Horizons: Compassionate Networked Art Forms and Noetic Fields of Cyborg Body and Consciousness Technoetic Arts: A Journal of Speculative Research 15, no. 3 (December 2017): 325-339.
  • Moore, Lila. Technoetic Magick: Explorations of the uncanny double as a noetic and magickal system through the complementary lenses of AI image-generation and AR (Jul 2024): 232-239.
  • The Amsterdam based artist couple Erwin Driessens (1963 Wessem) and Maria Verstappen (1964 Someren) have worked together since 1990. After their study at the Maastricht Academy of Fine Arts and the Rijksacademy Amsterdam, they jointly developed a
  • In my Art Electronic exhibition, ELECTROURBS, 1979, at N.O. Space, In Porto Alegre and after in 1982, at Funarte, Galeria Sergio Milliet I used one electronic stetoscope to amplify the heart beats for medical diagnostics, and creatively I intended
  • The Savant Guard -
    The Savant Guard is a public art commission for the city of Pasadena, California. Since its opening in July 2006 it is one of the few outdoor, publicly accessible "interactive" artowrks in the US. This project is a collaboration between myself
  • Face to Facebook texts from www.face ‐ to ‐ facebook.net by Paolo Cirio and Alessandro Ludovico. 2011 Logline: Stealing 1 million Facebook profiles, filtering them with face ‐ recognition software and then posting them on a custom ‐ made dating
  • "In this project Amazon.com's website was the vulnerable target. We eluded their copyright protections with a sophisticated hack of the "Search Inside" service. We stole complete digital volumes of books, reassembled them into .pdf format and