Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vpsfw Total loading time: 0 Render date: 2024-07-18T05:16:20.019Z Has data issue: false hasContentIssue false

10 - Citizens of the Cognisphere

from PART V - CRITICAL PEDAGOGY

Published online by Cambridge University Press:  04 July 2017

Michael Filimowicz
Affiliation:
Simon Fraser University, British Columbia
Veronika Tzankova
Affiliation:
Simon Fraser University, British Columbia
Get access

Summary

Abstract:

To become citizens of the cognisphere, a new generation of students requires a modified intellectual immune system with the social and cultural competencies to rein in technical affordances – a form of anthropotechnic autoimmunity. A liberal arts education that provides coding and machine learning capacity alongside humanistic competency prepares students to perform daily Turing tests on automated systems that have the capacity to learn and evolve, and reflect on how we are interpolated and disciplined by machine cognizers. The computational regime transgresses geopolitical sovereignty, for it predominates traditional governmental structures and systems of control. In the labor market of the computational regime, work follows information – to discrete information hubs and havens where infrastructure and conditions are opportune. The variety of praxes discussed in this article from the extreme ends of the planetary spectrum illustrate computational thinking through scientific breakthroughs such as CRISPR, geopolitical jurisdiction as in the case of Safe Harbor, and control systems exemplified by telematics. Following seminal sources such as N. Katherine Hayles's scholarship on the cognisphere and Benjamin Bratton's notion of the planetary computing stack, this chapter examines how students can engage the world as citizens of the cognisphere rather than 24–7 mercenaries operating an accidental planetary megastructure made of stacks and protocols. To that end, social and cultural competencies of the humanities remain critical, and must step up to the technological issues of our time.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

47 U.S. Code § 230 – Protection for private blocking and screening of offensive material. (1996). Retrieved August 20, 2015, from www.law.cornell.edu/uscode/text/47/230. Accessed online March 3, 2016.Google Scholar
Abbott, et al. (2016). Observation of gravitational waves from a Binary Black Hole Merger. Physical Review Letters, 116(6). Retrieved from http://link.aps.org/doi/10.1103/PhysRevLett.116.061102. Accessed online March 3, 2016.Google ScholarPubMed
Abumrad, J. and Krulwich, R. (2015a, June 18). Eye in the Sky. Retrieved March 12, 2016, from www.radiolab.org/story/eye-sky/. Accessed online March 3, 2016.Google Scholar
Abumrad, J. and Krulwich, R. (2015b, June 6). Antibodies Part 1: CRISPR. Retrieved August 15, 2015, from www.radiolab.org/story/antibodies-part-1-crispr/. Accessed online March 3, 2016.Google Scholar
Ackerman, S. and Thielman, S. (2016, February 09). US intelligence chief: We might use the internet of things to spy on you. Retrieved February 09, 2016, from www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper. Accessed online March 3, 2016.Google Scholar
Aiyer, G.R., Glott, R., Krieger, B., and Robles, G. (2002, June). Free/Libre and open source software: Survey and study FLOSS. Retrieved February 05, 2016, from http://flossproject.org/report/Final4.htm#_Toc13908258. Accessed online March 3, 2016.Google Scholar
Amazon Mechanical Turk. (2005). Retrieved February 15, 2016, from www.mturk.com/mturk/help?helpPage=overview. Accessed online March 3, 2016.Google Scholar
Berridge, K.C. and Robinson, T.E. (1998). What is the role of dopamine in reward: Hedonic impact, reward learning, or incentive salience? Brain Research Reviews, 28(3), 309–69.CrossRefGoogle ScholarPubMed
Biesecker, M. and Bykowicz, J. (2016, February 11). Cruz app data collection helps campaign read minds of voters. Retrieved February 22, 2016, from http://bigstory.ap.org/article/2db0fc93cf664a63909e26e708e91c67/cruz-app-data-collection-helps-campaign-read-minds-voters. Accessed online March 3, 2016.Google Scholar
Bilton, N. (2013, August 11). Disruptions: As new targets for hackers, your car and your house. Retrieved February 15, 2016, from http://bits.blogs.nytimes.com/2013/08/11/taking-over-cars-and-homes-remotely. Accessed online March 3, 2016.Google Scholar
Brandom, R. (2015, May 19). Scientists develop new ‘kill switch’ to destroy genetically-modified organisms that escape. Retrieved February 05, 2016, from www.theverge.com/2015/5/19/8625623/gmo-crispr-kill-switch-self-destructing-dna. Accessed online March 3, 2016.Google Scholar
Bratton, B.H. (2013, December 30). New perspectives – What's wrong with TED talks? Benjamin Bratton at TEDxSanDiego 2013 – Re:Think. Retrieved August 12, 2015.Google Scholar
Bratton, B.H. (2014, March). The black stack. Retrieved www.e-flux.com/journal/the-black-stack/. Accessed online August 23, 2015.Google Scholar
Bratton, B.H. (2016). The stack: On software and sovereignty. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Brueck, H. (2016, February 26). Here's why Chicago just made computer science a graduation requirement. Retrieved March 07, 2016, from http://fortune.com/2016/02/26/chicago-computer-science/. Accessed online March 3, 2016.Google Scholar
Caliando, B.J. and Voigt, C.A. (2015). Targeted DNA degradation using a CRISPR device stably carried in the host genome. Nature Communications, 6, 6989.Google Scholar
Callaway, E. (2015). Mosquitoes engineered to pass down genes that would wipe out their species. Nature. Retrieved from http://www.nature.com/news/mosquitoes-engineered-to-pass-down-genes-that-would-wipe-out-their-species-1.18974. Accessed online February 5, 2016.Google Scholar
Carpenter, R. (2011, September 3). Cleverbot comes very close to passing the Turing Test. Retrieved February 16, 2016, from www.cleverbot.com/. Accessed online March 3, 2016.Google Scholar
Crary, J. (2014). 24/7: Late capitalism and the ends of sleep (p. 144). London: Verso.Google Scholar
CURIA – Documents. (2014, May 13). Retrieved August 31, 2015, from http://curia.europa.eu/juris/document/document.jsf?docid=152065&mode=req&pageIndex=1&dir=&occ=first&part=1&text=&doclang=EN&cid=341631. Accessed online March 3, 2016.Google Scholar
Cyranoski, D. and Reardon, S. (2015, April 22). Chinese scientists genetically modify human embryos. Retrieved August 16, 2015, from www.nature.com/news/chinese-scientists-genetically-modify-human-embryos-1.17378. Accessed online March 3, 2016.Google Scholar
DARPA (2014). Defense Advanced Research Projects Agency: Where the future becomes now. Retrieved March 09, 2016, from www.darpa.mil/about-us/darpa-history-and-timeline. Accessed online March 3, 2016.Google Scholar
Deleuze, G. and Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia. Minneapolis, MN: University of Minnesota Press.Google Scholar
Deresiewicz, W. (2015, September 1). The neoliberal arts: How college sold its soul to the market. Harper's Magazine, 2532. Retrieved August 16, 2015, from http://harpers.org/archive/2015/09/the-neoliberal-arts/. Accessed online March 3, 2016.Google Scholar
DiBona, C. (2015, March 12). Bidding farewell to Google Code. Retrieved September 21, 2015, from http://google-opensource.blogspot.com.es/2015/03/farewell-to-google-code.html. Accessed online March 3, 2016.Google Scholar
DoJ. (2016, February 19). Government's motion to compel Apple inc. to comply with this court's February 16, 2016 order compelling assistance in search. Retrieved February 22, 2016, from https://assets.documentcloud.org/documents/2715926/Motion-to-Compel-Apple-Compliance.pdf. Accessed online March 3, 2016.Google Scholar
Dredge, S. (2015, August 27). Facebook M virtual assistant will compete with Siri and Google Now. Retrieved August 31, 2015, from www.theguardian.com/technology/2015/aug/27/facebook-m-virtual-assistant-siri-google-now. Accessed online March 3, 2016.Google Scholar
Drucker, J. (2014). Graphesis: Visual forms of knowledge production. Cambridge, MA: Harvard University Press.Google Scholar
European Space Agency. (2016, February 12). LISA Pathfinder overview. Retrieved February 21, 2016, from www.esa.int/Our_Activities/Space_Science/LISA_Pathfinder_overview. Accessed online March 3, 2016.Google Scholar
Facebook: What types of ID does Facebook accept? (2015, December). Retrieved February 16, 2016, from www.facebook.com/help/159096464162185. Accessed online March 3, 2016.Google Scholar
Facebook's Data Pool (2011). Retrieved August 20, 2015, from http://europe-v-facebook.org/EN/Data_Pool/data_pool.html. Accessed online March 3, 2016.Google Scholar
Peter Sloterdijk interview (2014, June 12). Retrieved February 01, 2016, from www.youtube.com/watch?v=N8x-cp7SXAs. Accessed online March 3, 2016.Google Scholar
Findings regarding the market events of May 6, 2010. (2010, September 30). Retrieved August 31, 2015, from www.sec.gov/news/studies/2010/marketevents-report.pdf. Accessed online March 3, 2016.Google Scholar
Foerster, H.V. (1982). To know and to let know: An applied theory of knowledge. Canadian Library Journal, 39, 277–82.Google Scholar
Freightliner, . (2015). Retrieved February 23, 2016, from www.freightlinerinspiration.com/. Accessed online March 3, 2016.Google Scholar
Galloway, A. (2004). Protocol how control exists after decentralization. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Gibbs, S. (2015, November 13). Google's self-driving car gets pulled over for driving too slowly. Retrieved February 05, 2016, from www.theguardian.com/technology/2015/nov/13/google-self-driving-car-pulled-over-driving-too-slowly?INTCMP=sfl. Accessed online March 3, 2016.Google Scholar
GitHub Help. (2016). Retrieved March 12, 2016, from https://help.github.com/articles/fork-a-repo/. Accessed online March 3, 2016.Google Scholar
Grothoff, C. and Porup, J.M. (2016, February 16). The NSA's SKYNET program may be killing thousands of innocent people. Retrieved February 29, 2016, from http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/. Accessed online March 3, 2016.Google Scholar
Groys, B. (2009). Education by infection. In Madoff, H. (Ed.), Art school: Propositions for the 21st century (pp. 2632). Cambridge, MA: MIT Press.Google Scholar
Hayles, N.K. (1999). How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Hayles, N.K. (2005). My mother was a computer: Digital subjects and literary texts. Chicago: University of Chicago Press.Google Scholar
Hayles, N.K. (2006a). Traumas of code. Critical Inquiry, 33(1), 136–57.CrossRefGoogle Scholar
Hayles, N.K. (2006b). Unfinished work: From Cyborg to cognisphere. Theory, Culture & Society, 23(7–8), 159–66. Doi:10.1177/0263276406069229.CrossRefGoogle Scholar
Hern, A. (2015, July 30). Google says non to French demand to expand right to be forgotten worldwide. Retrieved February 10, 2016, from www.theguardian.com/technology/2015/jul/30/google-rejects-france-expand-right-to-be-forgotten-worldwide. Accessed online March 3, 2016.Google Scholar
Home Page of The Loebner Prize in Artificial Intelligence. (2015). Retrieved August 31, 2015, from www.loebner.net/Prizef/loebner-prize.html. Accessed online March 3, 2016.Google Scholar
InfoCuria. (2015). Retrieved from http://curia.europa.eu/juris/recherche.jsf?cid=716879. Accessed online March 3, 2016.Google Scholar
Jinek, M., Chylinski, K., Fonfara, I. et al. (2012). A programmable dual-RNA-guided DNA endonuclease in adaptive bacterial immunity. Science, 337(6096), 816–21. Retrieved from http://science.sciencemag.org/content/337/6096/816. Accessed online March 3, 2016.Google Scholar
Job Search Results. Retrieved Labor Day, 2015, from www.upwork.com/o/jobs/browse/t/0/. Accessed online March 3, 2016.Google Scholar
Kaplan, E. (2015, March 1). The spy who fired me: The human costs of workplace monitoring. Harper's, 3140.Google Scholar
Kasperkevic, J. (2015, July 01). Google says sorry for racist auto-tag in photo app. Retrieved February 16, 2016, from www.theguardian.com/technology/2015/jul/01/google-sorry-racist-auto-tag-photo-app. Accessed online March 3, 2016.Google Scholar
Kim, K. and Wang, C. (2016, January 4). China's seven-minute selling Frenzy that shook global markets. Retrieved February 15, 2016, from www.bloomberg.com/news/articles/2016-01-04/china-s-seven-minute-selling-frenzy-shows-circuit-breaker-risks. Accessed online March 3, 2016.Google Scholar
Kirilenko, A.A., Kyle, A.S., Samadi, M., and Tuzun, T. (2015, December 28). The Flash Crash: The impact of high frequency trading on an electronic market. Available at SSRN: http://ssrn.com/abstract=1686004 or http://dx.doi.org/10.2139/ssrn.1686004. Accessed online March 3, 2016.CrossRefGoogle Scholar
Latour, B. (1981). Visualisation and cognition: Drawing things together. In Jones, R.A. and Kurlick, H. (Eds.), Knowledge and society: Studies in the sociology of culture past and present (Vol. 6, 140). Greenwich, CT: Jai Press.Google Scholar
Ledford, H. and Callaway, E. (2015). ‘Gene drive’ mosquitoes engineered to fight malaria. Nature. Retrieved February 5, 2016, from www.nature.com/news/gene-drive-mosquitoes-engineered-to-fight-malaria-1.18858?WC.mc_id=TWT_NatureNews. Accessed online March 3, 2016.Google Scholar
Lessig, L. (2010). Code: Version 2.0. Retrieved February 15, 2016, from http://codev2.cc/download remix/Lessig-Codev2.pdf available at http://codev2.cc/download+remix/Lessig-Codev2.pdf. Accessed online March 3, 2016.Google Scholar
Lewis, M. (2014). Flash boys: A wall street revolt. New York, London: W.W. Norton & Company.Google Scholar
Lewis, R. (2015, December 03). A conversation with CRISPR-Cas9 inventors Charpentier and Doudna|DNA Science blog. Retrieved February 19, 2016, from http://blogs.plos.org/dnascience/2015/12/03/a-conversation-with-crispr-cas9-inventors-charpentier-and-doudna/. Accessed online March 3, 2016.Google Scholar
Liao, H.K., Gu, Y., Diaz, A. et al. (2015). Use of the CRISPR/Cas9 system as an intracellular defense against HIV-1 infection in human cells. Nature Communications 6. Article number: 6413. DOI: 10.1038/ncomms7413. Retrieved from www.nature.com/articles/ncomms7413. Accessed online August 15, 2015.Google Scholar
Lynch, P. (Director). (2002). Cyberman [Motion picture on DVD]. Canada.Google Scholar
Mann, S. (2004). EyeTap personal imaging lab. Retrieved February 20, 2016, from www.eyetap.org/about_us/hilab/index.html. Accessed online March 3, 2016.Google Scholar
Manovich, L. (2013). Software takes command: Extending the language of new media. New York, NY: Bloomsbury Academic.CrossRefGoogle Scholar
Minsky, M. and Papert, S. (1969). Perceptrons: An introduction to computational geometry. Cambridge, MA: MIT Press.Google Scholar
Mordvintsev, A., Olah, C., and Tyka, M. (2015, June 17). Inceptionism: Going deeper into neural networks. Retrieved February 16, 2016, from http://googleresearch.blogspot.com/2015/06/inceptionism-going-deeper-into-neural.html. Accessed online March 3, 2016.Google Scholar
NASA's Toyota Study released by Dept. of Transportation. (2011, February 8). Retrieved August 27, 2015, from www.nasa.gov/topics/nasalife/features/nesc-toyota-study.html. Accessed online March 3, 2016.Google Scholar
Nanodegree Plus – Get a job guaranteed|Udacity. (2016). Retrieved February 15, 2016, from www.udacity.com/nanodegree/plus. Accessed online March 3, 2016.Google Scholar
Overbye, D. (2015, June 8). Black hole hunters. Retrieved August 16, 2015, from www.nytimes.com/2015/06/09/science/black-hole-event-horizon-telescope.html. Accessed online March 3, 2016.Google Scholar
Oye, K.A., Esvelt, K., Appleton, E. et al. (2014). Regulating gene drives. Science, 345(6197), 626–8.Google Scholar
Parker, A. and Corasaniti, N. (2014, October 30). Data-driven campaigns zero in on voters, but messages are lacking. Retrieved February 01, 2016, from www.nytimes.com/2014/10/31/us/politics/data-driven-campaigns-zero-in-on-voters-but-messages-are-lacking.html. Accessed online March 3, 2016.Google Scholar
Pearson, G. (2014, May 20). Will we still have fruit if bees die off? Retrieved September 7, 2015, from www.wired.com/2014/05/will-we-still-have-fruit-if-bees-die-off/. Accessed online March 3, 2016.Google Scholar
Reno v. American Civil Liberties Union, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997). (1997, March 19). Retrieved August 20, 2015, from www.law.cornell.edu/supct/html/96-511.ZS.html. Accessed online March 3, 2016.Google Scholar
Resnick, M. (1994). Turtles, termites, and traffic jams: explorations in massively parallel microworlds. Cambridge, MA: MIT Press.Google Scholar
Richtel, M. (2013, April 27). How big data is playing recruiter for specialized workers. Retrieved September 6, 2015, from http://nyti.ms/18JCAYS. Accessed online March 3, 2016.Google Scholar
Rogers, S. (2013, March 15). John Snow's data journalism: The cholera map that changed the world. Retrieved February 26, 2016, from www.theguardian.com/news/datablog/2013/mar/15/john-snow-cholera-map. Accessed online March 3, 2016.Google Scholar
Rosen, M., Weibel, P., Fritz, D., and Gattin, M. (2011). A little known story about a movement, a magazine and the computer's arrival in art: New Tendencies and Bit international, 1961–1973. Karlsruhe, Germany: ZKM/Center for Art and Media.Google Scholar
Safe Harbor: Advisory. (2015, February 11). Retrieved February 15, 2016, from www.export.gov/safeharbor/. Accessed online March 3, 2016.Google Scholar
Sang-hun, C. and Markoff, J. (2016, March 09). Master of go board game is walloped by Google Computer Program. Retrieved March 12, 2016, from www.nytimes.com/2016/03/10/world/asia/google-alphago-lee-se-dol.html. Accessed online March 3, 2016.Google Scholar
Schmidt, M.S. and Shear, M.D. (2015, January 26). A Drone, Too Small for Radar to Detect, Rattles the White House. Retrieved February 05, 2016, from www.nytimes.com/2015/01/27/us/white-house-drone.html?_r=0. Accessed online March 3, 2016.Google Scholar
Scott, M. (2015, October 06). Data transfer pact between U.S. and Europe is ruled invalid. Retrieved February 10, 2016, from www.nytimes.com/2015/10/07/technology/european-union-us-data-collection.html. Accessed online March 3, 2016.Google Scholar
Scott, M. (2016, January 24). Europe's top digital – Privacy watchdog zeros in on U.S. Tech giants. Retrieved January 28, 2016, from www.nytimes.com/2016/01/25/technology/europes-top-digital-privacy-watchdog-zeros-in-on-us-tech-giants.html. Accessed online March 3, 2016.Google Scholar
SEC approves new rule requiring consolidated audit trail to monitor and analyze trading activity. (2012, July 11). Retrieved August 30, 2015, from www.sec.gov/News/PressRelease/Detail/PressRelease/1365171483188. Accessed online March 3, 2016.Google Scholar
Section 230 of the Communications Decency Act (2015). Retrieved August 20, 2015, from https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act#Case_law. Accessed online March 3, 2016.Google Scholar
Sims, K. (1994, July 1). Evolving virtual creatures. Retrieved August 17, 2015, from www.karlsims.com/papers/siggraph94.pdf. Accessed online March 3, 2016.Google Scholar
Singer, P.W. (2009). Wired for war: The robotics revolution and conflict in the twenty-first century. New York: Penguin Press.Google Scholar
Sloterdijk, P. (2007, November 25). Optimierung des Menschen? Retrieved February 15, 2016, from www.tele-akademie.de/begleit/video_ta110116.php. Accessed online March 3, 2016. SWR Fernsehen Tele-Akademie.Google Scholar
Sloterdijk, P. (2011). Bubbles: Microspherology (W. Hoban, Trans.). Los Angeles, CA: Semiotext(e).Google Scholar
Sloterdijk, P. (2016). Stress and freedom. Cambridge: Polity.Google Scholar
State National Bank of Big Spring v. Jacob J. Lew. (2014, November 19). Retrieved from http://harvardlawreview.org/2016/01/state-national-bank-of-big-spring-v-lew/. Accessed online August 31, 2015.Google Scholar
Steve Fossett – Mechanical Turk results. (2007, September 24). Retrieved September 7, 2015, from http://s3.amazonaws.com/fossett/index.html. Accessed online March 3, 2016.Google Scholar
Steyerl, H. (2010). Politics of art: Contemporary art and the transition to post-democracy. E-flux Journal. Retrieved from www.e-flux.com/journal/21/67696/politics-of-art-contemporary-art-and-the-transition-to-post-democracy/. Accessed online August 5, 2015.Google Scholar
Steyerl, H. (2013). Freedom from everything: Freelancers and mercenaries. Retrieved September 6, 2015, from www.e-flux.com/journal/freedom-from-everything-freelancers-and-mercenaries/. Accessed online March 3, 2016.Google Scholar
Talking to Machines. (2015). Retrieved www.radiolab.org/story/137407-talking-to-machines/. Accessed online August 31, 2015.Google Scholar
The Trust Engineers. (2015, February 9). Retrieved www.radiolab.org/story/trust-engineers/. Accessed online August 31, 2015.Google Scholar
Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.Google Scholar
Upwork, the world's largest online workplace. (2015). Retrieved http://upwork.com/. Accessed online February 15, 2016.Google Scholar
Wark, M. (2015, August 29). E-flux journal 56th Venice Biennale – SUPERCOMMUNITY – The vectoralist class. Retrieved September 21, 2015, from http://supercommunity.e-flux.com/texts/the-vectoralist-class/. Accessed online March 3, 2016.Google Scholar
Wenning, R. and Schunter, M. (2006, November 13). The platform for privacy preferences 1.1 (P3P1.1) specification. Retrieved February 22, 2016, from www.w3.org/TR/P3P11/#Introduction. Accessed online March 3, 2016.Google Scholar
Whalen, T. (1994). My experience with the 1994 Loebner competition. Retrieved January 29, 2016, from http://thomwhalen.com/nonfiction/ThomLoebner1994.html. Accessed online March 3, 2016.Google Scholar
Wiener, N. (1961). Cybernetics; or, control and communication in the animal and the machine 2nd ed. New York: MIT Press.Google Scholar
Willemsen, E. (2015, December 23). Ski federation bans drones after camera nearly hits racer. Retrieved February 19, 2016, from http://bigstory.ap.org/article/9680a8b4a3934750a8eeacd6594996cb/ski-federation-bans-drones-after-camera-nearly-hits-racer. Accessed online March 3, 2016.Google Scholar
Williams, T. (2015, August 12). Facial recognition software moves from overseas wars to local police. Retrieved August 16, 2015, from www.nytimes.com/2015/08/13/us/facial-recognition-software-moves-from-overseas-wars-to-local-police.html. Accessed online March 3, 2016.Google Scholar
Wingfield, N. (2015, June 10). How's my driving? The insurer knows. Retrieved September 5, 2015, from http://bits.blogs.nytimes.com/2015/06/10/hows-my-driving-the-insurer-knows/. Accessed online March 3, 2016.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×