# Bonus Hearty Friday – LOLcat Edition

I had already found an image for Hearty Friday this week, but here’s a bonus I came across this evening:

# It is/will be a girl!

We have updated, more accurate ultrasound results: we’re going to have a girl! We’ve dodged the boy-naming problem… this time.

# Scientific Writing and E-Prime

E-Prime is a modification to the English language in which the verb “to be” is not allowed. I first learned of it via Catallaxy (disclaimer: I occasionally post on Catallaxy), where Cato links to this article.

I love the idea of E-Prime. A few attempts to speak or write in it convinced me that it makes it difficult to hide assumptions. E-Prime is therefore very appropriate for scientific writing, in which it is important to clarify what assumptions were made. Unfortunately, removal of the verb “to be” causes awkward and sometimes repetitive writing, particularly in “Methods” writing. It gets rid of the passive voice, oh-so-beloved pseudo-humble writing style of many a scientist.

## Normal Methods

The model was paced eight times at a basic cycle length (BCL) of 300 ms. A shock was then applied with a field perpendicular to the direction of propagation over a range of coupling intervals (CIs) following the last paced beat. Once reentry was initiated, the model was allowed to run until action potential duration (APD) stabilized to a variation of less than 1 ms per beat.

## E-Prime Methods

We paced the model eight times at a basic cycle length (BCL) of 300 ms. We then applied a shock with a field perpendicular to the direction of propagation over a range of coupling intervals (CIs) following the last paced beat. Once we initiated reentry, we allowed the model to run until action potential duration (APD) stabilized to a variaition of less than 1ms per beat.

Not too awkward there, but to be is replaced by we (verb)ed, resulting in gratuitous use of the Royal We. Zeus forbid we use the first person pronoun “I” in a scientific paper. Imagine several more paragraphs of this, though — it can get annoyingly repetitive quickly.

Perhaps it is more important to focus on the use of E-Prime in results. After all, one of the best examples I’ve seen of the utility of E-Prime is in describing elementary particles (as done in the linked article):

A proton appears to behave like a particle when observed by instrument 1. A proton appears to behave like a wave when observed by instrument 2.

vs.

A proton is a particle. A proton is wave.

Even for people who are well-versed in the mathematics and various experiments used to generate the statements above, one is clearer than the other. In fact, I would go so far as to say that the E-Prime version (first one) is a set of observations, while the “to be”-inclusive version (second) is a set of (contradictory) conclusions.

Now, assuming that I want to write my papers in E-Prime, how do I buck the system in which people are used to passive voice and still get published?

Disclaimer: I did not attempt to make this post E-Prime-compliant, though this disclaimer follows the rules of E-Prime.

# Hearty Friday – Cactus

IXS_0010

Hearty Friday comes early this week, as I’ll be traveling tomorrow.

# Your Emails — They are not secure

In other news from the house-hunting front, we’ve been working with lenders to finance the purchase of a house. Lenders want a lot of information. They want bank statements, driver’s license copies, landlord information, tax returns, income statements, current address, credit card statements, letters of employment and so on. Of course, they also want that ubiquitous, unchangeable, universal secret password, the social security number.

You would think, given the nature of this collection of information, and the rising prevalence and cost of identity theft, that these people would be careful with this information. If you’re cynical or just a realist, maybe you wouldn’t think that. Anyway, you’d be wrong. One of the first lenders we dealt with EMAILED A COMPLETE, FILLED COPY of the application form to us for signatures. No encryption, whatsoever. It was like an identity theft starter kit. After we confronted them about it, they said they had no idea this was insecure, and offered to fax or FedEx the documents instead.

If you don’t already know this, you really need to know: Email, without any special add-ons, is the opposite of secret. It is the digital equivalent of a postcard — anyone along the way can read it, and you have no idea who will be along the way. Would you tape your social security card to the back of a postcard and send it across the country? Furthermore, there’s no guarantee that an email’s “From:” address is accurate, as you may have deduced from spam email that you’ve received. All it takes to forge it is changing a string of text when putting the message together.

There are ways to use email to send secure, confidential communications. Probably the most universal and robust way is with PGP or (preferably) GPG. The main reason these solutions aren’t used more widely is that encrypted communication is difficult to do correctly. Keys have to be generated, passwords selected, keys exchanged and signed, managed, and sometimes even revoked. A number of pieces have to fit together, including the encryption engine, mail program plug-ins, and file encryption software. The difficulty of using proper encryption is not, however, an excuse for sending my SSN in plain text via E-mail. When used with good enough ciphers, email can be safe even from the prying eyes of the US Government, who would have to spend hundreds or thousands of years of computer time attempting to crack your key. Furthermore, with or without encrypting the message, cryptographic signatures may be used to verify that the purported sender of the message is in fact the true sender of the message. This eliminates the problem of From address forgery.

Should you wish to send encrypted e-mail my way, you may find my public key here.