Pretty regularly – usually in the middle of one of those interminable fixed-vs-random effects discussions – someone will pipe up that “Of course, for Bayesians this random vs fixed effect distinction makes no sense because all parameters are random”.
To the extent it can be made to make sense, the claim is false. It’s also unhelpful because it’s pretty much guaranteed to confuse and put-off people who have better things to do than pay attention to arguments in statistics.
But on the off chance you have a moment for one of those, let me try to disentangle things.
Continue reading No, Bayesians don’t think all parameters are random
Some people think it isn’t rational to vote. Usually the argument is as follows: the probability of being pivotal, that is: the probability that your vote will ‘decide’ the winner, shrinks rapidly as the number of voters increases. So if you vote in the hope of determining an outcome, then the probability of that happening is small enough for it not to be worthwhile trying.
Let’s leave aside the virtues of this argument and consider a hypothetical against vaccination.
Continue reading Voting and vaccinating
A: You know I like the idea of using logic and logical deduction to understand how thinking should be done. This idea that beliefs are, or at least should be, the conclusions of deductive arguments is very clear and elegant. But I do worry…
B: You worry? Tell me about your worries.
Continue reading Premises
Sometimes a bit of R code needs to know what operating system it’s running on. Here’s a short account of where you can find this information and a little function to wrap the answer up neatly.
Continue reading Identifying the OS from R
A little while back a New York Times article discusses the consequences for college admission of saying undiplomatic things in social media. Apparently colleges monitor, or at least check up on, the social media presence of their potential applicants to see whether they’re the right kind of person for the school. Inevitably, students scrub, curate, or simply hide their account in response.
Leaving aside the possible rights and wrongs of this behaviour, we might ask: how does the college identify a social media account as belonging to one of their potential students? The general answer is that social media like Facebook and Google plus have a ‘real names policy’. And the answer to why they have that is, allegedly, that people behave more civilly towards one another when they are not hidden behind an anonymising username. One may doubt that is the only reason, given the value of the personal information thereby acquired. Nevertheless it seems to widely believed that, despite some awkward evidence to the contrary, that this works.
How does it work, if it does? Continue reading What’s so great about real names?
Hey Mac OSX users with Java 1.8 installed. Did R just request a Java 1.6 installation and then promptly crash your session? If so, read on…
Continue reading Getting R and Java 1.8 to work together on OSX
A couple of days ago the Monkey Cage featured Ben Lauderdale’s one-dimensional scaling model of US State of the Union addresses. In this post, I replicate the analysis with a closely related model, ask what the scaled dimension actually means, and consider what things would look like if we added another one.
The technical details are all at the bottom of the post if you want to try this at home.
Continue reading More SOTU Scaling
I’ve been playing around with the R package texreg for creating combined regression tables for multiple models. It’s not the only package to do that – see here for a review – but it’s often handy to be able to generate both ascii art, latex, and html versions of the same table using almost identical syntax. Also, the ascii art creating screenreg function allows me to bypass the pdf construction cycle I previously described here. The coefficient plots from plotreg are pretty cool too.
This post is about making the variables listed in those combined regression tables more readable. That is particularly important when data comes from variable-mangling statistical software or from co-authors whose idea of a descriptive name could pass for an online banking password. Even R will cheerfully mash up your carefully chosen variable names through formulas, factors, and interactions. So for work people are going to see, variables should have sensible names.
First I’ll walk through the existing texreg machinery for renaming, omitting, and reordering variables, and then propose a hopefully more intuitive implementation. I’ll demonstrate all this using screenreg on a classic data set on job prestige.
Continue reading Call them what you will
Perhaps you tried to open some application or mount some DMG on your Mac and encountered the following alarming message
“[Application] is damaged and can’t be opened. You should move it to the trash.”
Perhaps it is indeed damaged. But more likely it is just not signed by its developer or not made available from the AppStore, depending on how tight your security preferences are set. A less misleading message would certainly be nice.
If it’s not really damaged then how do you get the application to open?
If you trust the people from whom you are downloading things you can bypass the warning by adjusting your ‘Preferences > Security & Privacy’ to
Allow applications downloaded from: Anywhere
It is sufficient to do this once when you first open the application, and it’s probably best to re-tighten the preferences once it is successfully launched.
So who is it that does not sign their applications and causes you all this trouble?
Me, for one. None of my software is signed and none of it is distributed via the AppStore. The ability to sign software depends on paying one hundred dollars a year to Apple become a ‘registered developer’. (I understand that similar plans are in the works for Microsoft developers). As a result, many of us open source software developers have not signed our applications.
Now, as it happens I have just ponied up so as soon as I figure out how to get my code into XCode and sign it you won’t get the warning from my software. But before then, if you’re wondering whether you should trust me enough to put your shields down, you can always ponder the source code, or be reassured that others can.
So now you know what the alarming message probably actually means, and also what you can do about it.