Back in my days of blissful ignorance, I didn't notice gender use in language very much. "John Doe" and "He" were pretty much par for the course.
At some point, I was reading an article and it was positively littered with "him or her" "he or she" "his or hers", and I wanted to pull my hair (short or long) out. While I appreciated the sentiment it was completely distracting from the prose.
I once was given a Parenting 101 book, and it alternated between male and female examples per section (i.e., every few pages). I liked this approach a lot better, because it made for much easier reading while still being gender inclusive.
Gender exclusive language has no place in scientific writing, unless the author is describing a single case study (i.e., "When Patient M. first came to the hospital, he..."), a gendered-exclusive event (i.e., The Society for Women Engineers summer camp for fourth grade girls), or is somehow written in the third person from the perspective of one of the authors.
It's very easy to use anonymous, gender-neutral subjects in sentences to give examples of people. For example, "the student", "the user", "the agent", "the engineer", "the scientist", etc.
It takes practice to write in active voice while remaining gender neutral; sometimes the writing can get a bit bogged down when you start. Sometimes writing they or them can feel awkward. But like any sort of writing, practice makes perfect. After awhile it becomes second nature.
Unlike those days of blissful ignorance, as a reviewer I am now very distracted and occasionally annoyed by both gender exclusive language (of either gender), as well as by too many Orshees. In some particularly egregious cases of the former I have politely reminded the authors to be more sensitive to their use of language. I know it is often a result of English being a second language.
Google, however, really should know better. Check out this error message I just got in Chrome (emphasis mine):
In this case, the certificate has not been verified by a third party that your computer trusts. Anyone can create a certificate claiming to be whatever website they choose, which is why it must be verified by a trusted third party. Without that verification, the identity information in the certificate is meaningless. It is therefore not possible to verify that you are communicating with XXX.YYY.ZZZ, instead of an attacker who generated his own certificate claiming to be XXX.YYY.ZZZ. You should not proceed past this point.If I was a man I might be offended. I'm sure there are plenty of female hackers out there. (Heck, even that attack is poorly named - "man in the middle". I guess it's catchier than "person in the middle", but still).