Monday, August 24, 2020

Military Service Should be Mandatory Essay -- Papers

Military Service Should be Mandatory Americans, particularly people born after WW2, ought to be embarrassed about themselves. In what manner can the world's most extravagant populace released its military asking for initiates? Every year, the military administrations - Air Force, Army, Marines, Navy - set up selecting objectives to keep up satisfactory quantities of work force. The numbers change every year relying upon, among different components, administration needs, enrollment calculates the prior year and maintenance of current soldiers. Most educated people know about the sorry measurements, yet let me rehash them for the record: The Air Force has an objective of 33,800 during the current year; it hopes to miss the mark by 1,700. The Army needs 74,500 however will come up short by 6,300. As of now shy of its objective of 53,200, the Navy hopes to have enough enrolls by the end of the week. Due to its one of a kind custom, the Marine Corps is the main branch that reliably fills its portion. Altogether, as per the Associated Press, the administrations need 197,115 enlisted people to keep up a power of 1.4-million. For what reason are the administrations experiencing serious difficulties enrolling? One evident explanation, as indicated by the New York Times, is that the quantity of individuals between ages 18 and 22, the prime age for initiates, has dropped to roughly 21-million, 5-million less than in 1980. Another significant explanation, obviously, is that the economy has opened openings for work to the individuals who in any case may consider the to be as an alternative. These two are genuine purposes behind the contracting enlisting pool, yet I see another explanation, one that is maybe at the core of the issue: As a gathering, those somewhere in the range of 18 and 22 are not energetic. What's more, maybe far more atrocious, too many child of post war America guardians and other influencers - educators and mentors - insult the milita... ...y in the event that we hope to enlist adequately. Where I am from, we call such reasoning totally wrong. No, we have to scrap the all-volunteer armed force idea and draft everybody - including the offspring of the rich and the ground-breaking in gated enclaves - who doesn't chip in. I leave the coordinations to the specialists. Shockingly, cash drives everything nowadays. At the point when guardians exhort their kids on profession decisions, less of them ever notice the military. It's anything but an alternative. The New York Times cites a 17-year-old senior in the class of 2000 about the mentalities of his friends toward the military. His reaction? It's not even in their vocabularies. As a country, we ought to be embarrassed. President Clinton isn't to be faulted for this one, parents. We all - particularly guardians, instructors and mentors - are culpable. Each and every individual who appreciates the opportunity of living in America should serve.

Saturday, August 22, 2020

Analysis of Strategy Essays

Examination of Strategy Essays Examination of Strategy Essay Examination of Strategy Essay Jim’s Services was begun from the feelings of Jim’s heart as connected to the objectivity of his head. Jim didn't sufficiently break down and inspect the market condition, the objective market, the opposition, and the piece of the pie he wanted to enter. Jim utilized the, â€Å"fallacy of prediction† as his thinking for beginning Jim’s Services. His methodology didn't recognize the entirety of the components of the market condition, its action and how it is driven. Jim didn't have an unmistakably characterized mission nor did he direct a proficient natural sweep of the market. He distinguished the populace size and the adjustments in that size during changes in season, anyway he neglected to direct an exhaustive precise investigation of the objective market and Mr. Bullard’s Services. Mr. Bullard had a set up client base and notoriety that gave him an upper hand over Jim’s Services. Jim’s Services didn’t offer any unmistakable capacities aside from the way that he could be accessible with little notification. This is just credited to the way that he didn’t have an enormous client base. Jim neglected to productively recognize the entirety of his qualities and shortcomings and match them with his chances and dangers. Jim didn't arrive at his expansive objective of a $65,000 compensation since he didn't assess his condition, or define a particular procedure to arrive at his objective. Jim formulated an expansive objective of $65,000, anyway he neglected to distinguish a particular procedure of how he would arrive at this objective. In the event that Jim despite everything needs to have Jim’s Services in the Petoskey territory than he ought to separate himself from Mr. Bullard by offering administrations Mr. Bullard doesn't offer. References:

Wednesday, July 22, 2020

Essay Topics That Will Help You Write an Interesting Essay

Essay Topics That Will Help You Write an Interesting EssayIn order to write an interesting essay, you need to know a few things about essay topics and how to approach them. This can make the difference between a poorly written essay and one that will be interesting and thought provoking. In addition, it will help you get your essay finished in a reasonable amount of time. The following is a basic guide to the types of essay topics that you should use.The first topic that you should consider when writing an essay is the topic that is most likely to interest you. This is something that you should do in order to get an idea of what you want to write about. This is a great way to write the bulk of your essay because it can help you avoid the difficult choices that are involved with writing a dissertation. However, it is not a good idea to choose topics that you are not interested in as this can hinder your ability to write the essay.Some topics that you might consider are current events, history, current events, sports, literature, religion, world news, and even poetry. Depending on what you enjoy, these can be a great way to get your essay started. For example, if you are into sports, you can write an essay about the teams that you follow and what teams they are playing. Of course, if you are not interested in sports, you can still find a topic that you are interested in and stick with it for the bulk of your essay.Informational topics will allow you to relate your research to the topic of your essay. The topics should also be interesting to you. For example, if you were interested in foreign languages, you could choose topics such as foreign languages or foreign cultures. This will allow you to gain more information about the subject matter without having to worry about having too much information in your article.Informational topics are usually written to help the reader understand the topic of the essay. Often times, people who are writing essays will want to p oint out certain things that are important to the reader in order to make the reader interested in the topic. This can be done in many different ways. Sometimes, you can use an informative essay as an outline for the remainder of the essay.Informational essays can also be used as a primer in a paper or as an introduction to the rest of the paper. Since they are written to help you understand the topics of the paper, they are usually written in a very short period of time. You can find out a lot about the topic by completing an informational essay because you will already have a base for the rest of the paper.Informational essays also help you learn how to write a paper. If you use informative topics, you will gain knowledge and experience in how to create an informative essay. Therefore, you will have more confidence in your ability to write an informative essay.Informational essays are excellent ways to gain insight into a particular topic that interests you. Informative essays are a good starting point for your dissertation. If you use a number of informative essays, you will find that you can write a more comprehensive and powerful essay on any topic that you choose.

Friday, May 22, 2020

Annotated Bibliography On Various Databases Used For...

Several databases were used for this review. Sources primarily came from EBSCO, which included Academic Search Complete, Education Full Text, OmniFile Full Text Mega, General Science Full Text, EBSCO Professional Development Collection, and Social Sciences Full-Text databases. In addition, the EBSCO eBook Collection and the EBSCO ebrary collection for full-text books were utilized. Other databases used for this review include Google Scholar and ERIC. The search was narrowed by limiting sources to academic journals and books. Where possible, only peer-reviewed sources were used. Some keyword descriptors did not produce results within the peer-review parameters. The keywords searched included individual searches or pairings of the following words: augmentative and alternative communication systems, severe/multiple disabilities, severe communication impairments, pre-service special education teachers, communication disorders, competencies, knowledge and skills, special education, AAC,. Limitations of the search results. While sources for this review were obtained from academic and scholarly sites, the number of peer-reviewed sources was limited. To maximize academic integrity of the source material, all sources were taken from academic journals or from books published by qualified experts in the field. In addition, while the research questions focused on instructional preparation of special education teachers using AAC, few sources on the combined delimiters were available.Show MoreRelatedImpact of Ict on Society2585 Words   |  11 PagesInformatics ISIT900 Fundamentals of Contemporary Technologies Impact of ICT on Society Table of Contents PART A 1 1. Introduction 1 2. The annotations 1 2.1 Scholarly journal articles 1 2.2 Conference papers 1 2.3 Newspaper articles 1 2.4 Internet sources 1 3. Conclusion 2 Annotated Bibliographies 3 PART B (Endnote) 6 4. Introduction 6 5. The Endnote advantages 6 6. The Endnote disadvantages 7 7. The Recommendations 8 8. Conclusion 9 9. References 10 Read MoreInformation Security15951 Words   |  64 PagesInforming Science Journal Volume 9, 2006 A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research Yair Levy and Timothy J. Ellis Graduate School of Computer and Information Sciences, Nova Southeastern University, Florida, USA levyy@nova.edu ellist@nova.edu Abstract This paper introduces a framework for conducting and writing an effective literature review. The target audience for the framework includes information systems (IS) doctoral studentsRead MoreIB EE GUIDE9051 Words   |  37 Pagessources fast 11 I can’t find it on Google, where do I look? 12 All topics 12 Humanities Literature 12 Sciences 13 Encyclopaedias 14 Magazines 14 eBooks 14 Referencing, Bibliographies and Citations 15 What is a bibliography? 15 What is a citation? 15 Examples of citation bibliography 16 Website 16 e-book 16 Image online 16 Interview 16 Generic Extended Essay Feedback Form 17 Extended Essay Study Plan 20 Business Management 21 Overview 21 Choice of topic 21 Treatment of theRead MoreEssay about Year Round Education: A New Perspective2525 Words   |  11 PagesRound Education: A New Perspective Introduction Over the years we have gained aspect to all the new technologies and advancements that have improved the educational system. Each innovation has helped in some way or another to develop better academic programs in schools around the United States. Recently, a proposal has been made to change the traditional school year of nine-months to a year-round program that has sparked controversy all over. Despite controversy though, there are still manyRead MoreMastering Graduate Studies 1e32499 Words   |  130 PagesACADEMIC INTEGRITY RESEARCH LIBRARY KNOWLEDGE SKILLS COMMUNICATION EXPECTATIONS CAREER PATH IMPRINT Title Mastering Graduate Studies EDITION 1 CONTRIBUTORS Editor: Alexis DiVincenzo Consulting Editors: Mark Alexander, Nicole Quow-Thomason Art Direction Senior Art Director: Miranda Hildebrand Art Development and Design: Jo DeSnyder-Rolfe Permissions contact Grand Canyon University 3300 W Camelback Rd Phoenix, AZ 85017 602.639.7500 Copyright Information Grand Canyon University. AllRead More The Montessori Method Essay2399 Words   |  10 PagesThe Montessori Method (Word count includes Annotated Bibliography) The Montessori method began in the early 1900s by the first female doctor in Italy, Dr. Mary Montessori, as a way of educating mentally disabled children. Her ideas were so successful with these children that she began to apply her understanding of learning to study the potential of normally functioning children (Oalf, 2001). Dr. Montessoris approach to education stresses the importance of learning styles, independence andRead MoreElectronic Media13295 Words   |  54 PagesScientific Communication Rob Kling Geoffrey McKim April 27, 2000 Indiana University School of Library and Information Science 10th Jordan, Bloomington, IN 47405 USA +1 812 855 5113 kling@indiana.edu, mckimg@indiana.edu Accepted for publication in: Journal of the American Society for Information Science Abstract The shift towards the use of electronic media in scholarly communication appears to be an inescapable imperative. However, these shifts are uneven, both with respect to field and with respectRead MoreStudy Habits2859 Words   |  12 PagesSUBJECT: NURSING EDUCATION SEMINAR ON: DEVLOPMENT OF EFFECTVE STUDY HABIT General Objectives: The students will gain in depth knowledge about various methods of effective learning and practice it during their study time. Specific Objectives: At the end of the seminar the students will be able to, 1) Define learning and study habits 2) Explain the concept of Study skills 3) Describe the Process of study 4) Enlist the Types of learning 5) Develop Effective Study Habits 6) ElaborateRead MoreEvidence and Examples of the Four Learning Outcomes2455 Words   |  10 Pagesachieved the objectives of the four Learning Outcomes set-forth in this class. Learning Outcome One states that students by the end of the class will learn how to â€Å"produce writing that demonstrates their ability to identify, describe, and analyze various occasions for writing, genres, conventions, and audiences in their discipline or profession from a rhetorical perspective† (Bell, 2014). Prior to the â€Å"Group Report Presentation†, â€Å"Summary Assignment†, and â€Å"Interview and Ethnography Assignment† I didRead Moreen1320 graded assignments 11131313296 Words   |  54 PagesGenre Essay—Report (Drafting) 47 Unit 7 Assignment 1: Using Empirical Tools 48 Unit 7 Project Part 3: Team Debrief Summary Sheet and Reflection on Collaborative Writing and submission of Rhetorical Analysis 49 Unit 7 Research Paper Part 3: Annotated Bibliography for Research Paper 51 Unit 7 Research Paper Part 4: Body Paragraphs 52 Unit 7 Exercise 1: Group Presentations—Preventing Plagiarism 53 Unit 7 Exercise 2: Guided Reading 54 Unit 8 Assignment 1: APA Reference Page 55 Unit 8 Research Paper Part

Thursday, May 7, 2020

Utilitarian vs. Kantian - 1200 Words

This paper was written during the final exam for an ethics class, from memory. As such, there are no referances, but it still makes for a pretty good outline for a paper on utilitarian and Kantian ethical theories. With so many varying views on morals and ethics, trying to use reason in ethics without resorting to emotional judgments is difficult. The first stop to overcoming this obstacle is to begin by studying ethical theories. Once a good grasp of the theories has been established, the next task is to create an extreme hypothetical situation and apply the theories to it. Once this can be achieved correctly, it will become easier to make ethical decisions in day-to-day life. Following this process the situation is thus:†¦show more content†¦Kantian Ethical Theory says to turn the one into a fine red mist. Looking at this scenario from Utilitarian point of view is much simpler than the Kantian view. The reason for this is because utilitarianism is consequence driven; ergo it does not matter if the one or the nine blows up the one, or if they abstain from ventilating the one. Either way, the end state is the same, no matter whose hand (or faces, pants and shirts) the blood is on. Now in order for this scenario to be resolved by utilitarianism, some assumptions must be made. When we say that the ten are average people, we assume that they all have the average number of friends, family, skills, knowledge, and abilities; for if any one of these is different for one of the individuals, then it would change the amount of utility if that one person lives or dies. This being said, there would be no need to compute the hedonic calculus, since the net outcome would be the same (x) for any one of the ten. Therefore it is a simple matter of which is greater, x or 9x. From this, it is c lear that either by choice of the one or the nine, the one should be first to greet his/her maker.Show MoreRelatedEssay about Kantian vs Utilitarian Ethical Parameters990 Words   |  4 Pagessituations and determine the ethical parameters in which a person should act. The two philosophical approaches that I will examine the situations with the Kantian and Utilitarian point of view. Kant deciphers his ethical questions by examining a persons motivation for performing an act regardless of the consequences. A person who utilizes the Kantian view believes that the only pure good is pure human reason without consequences. This pure human reason works without the influence of human emotionsRead MoreEhtics in ABC Corporation Essay945 Words   |  4 Pagesthis material fact to DEF because Johnnie is Tommy boss, so he is afraid of getting fired by Johnnie. So, we decided to use Kantian vs. Utilitarian to see whether tommy should disclose this information to DEF. First, the idea behind the Kantian approach is that every human being has an inherent worth because humans have worth in and out of themselves. Nonetheless, the Kantian approach depended on the categorical imperative. The Categorical imperative says â€Å"one ought to act such that the principleRead MoreJohn Stuart Mill s Utilitarianism Essay1381 Words   |  6 Pagesthere being many different theories, som e can overlap while others can vary greatly. The two most widely known theories, Utilitarianism and Deontological ethics, greatly conflict with each other. They differ mostly in what they value most, the outcome vs. the action/motive. John Stuart Mill’s Utilitarianism itself differs from the original form of Utilitarianism created by Jeremy Bentham. Bentham felt that pleasure was wholly good, and that pain to the lone evil in the world, as he said, â€Å"Nature hasRead MoreEssay about Consequentialism: The Global Poor1203 Words   |  5 Pages(Sinnott-Armstrong). Peter Singer is a notable Utilitarian philosopher and a strong supporter of the idea of Consequentialism. When it comes to the issue of the global poor, his consequentialist view is that people should help the poor. He believes that â€Å"if it is within one’s ability to prevent something bad from occurring, and in the process, not sacrifice something of comparable moral good, then one is bound to do itâ⠂¬ ( ONeill vs. Singer: Utilitarian Famine. ). He believes that everyone has thisRead MoreComputer Ethics Term Paper : Security Vs. Privacy1518 Words   |  7 PagesJames Santana Computer Ethics Term Paper Security vs. Privacy Following the terrorist attacks on September of 2001, President George W. Bush signed into law The USA PATRIOT Act. Intended to enhance law enforcement investigatory tools, The Patriot Act made changes to surveillance laws that enabled the U.S government to collect computer information about both American and foreign citizens in unprecedented ways. During the following years, through a series of legislative changes and court decisionsRead MoreSecurity Vs. Privacy : Should Edward Snowden Be Pardoned For Leaking1277 Words   |  6 PagesSecurity vs. Privacy Should Edward Snowden be pardoned for leaking thousands of classified NSA documents? An analysis of the merits of the Snowden leaks and the broader issue of security vs. privacy and mass surveillance from the perspective of at least two ethical theories. Following the terrorist attacks on 911, President George W. Bush signed into law The USA PATRIOT Act. Intended to enhance law enforcement investigatory tools, The Patriot Act the made changes to surveillance laws thatRead MoreDr. Ethos, The Chief Resident Of A Hospital1591 Words   |  7 Pagesprocedure could go off without a problem. However, the cranky old man would have to die, or rather be killed, in order to successfully treat all the patients. The question is, what would Dr. Ethos do, if he were Utilitarian (Act vs. Rule)? What would Dr. Ethos do, if he were a Deontologist (Kantian)? Utilitarianism John S. Mill describes Utilitarianism, also known as â€Å"The greatest happiness principle†, as a philosophical theory of morality. This theory focuses on the end result, rather than the motiveRead MoreUtilitarianism Vs. Kantian Theory1100 Words   |  5 PagesMelanie Dolechek 3/30/17 PHI Essay #2 Utilitarianism vs Kantian Theory Morality is a complex subject and ethical dilemmas yield differing opinions and theories that have manifested through time by intelligent philosophers. There were two influential philosophers’ names Jeremy Bentham and Immanuel Kant, who formed differing theories, in an attempt to set a uniform approach to ethical dilemmas and morality. Bentham was a firm supporter of Utilitarian theory; which focuses on overall happiness and consequencesRead MoreThe Moral Dispute Of John Stuart Mill And Immanuel Kant1500 Words   |  6 Pagesrendering reward with heaven. Aristotle’s theory and argument will be explored further in this review along with the works of some of his successors. The Moral Dispute John Stuart Mill vs Immanuel Kant Philosopher John Stuart Mill’s theory highlights utilitarianism and Kantian theory would be the total opposite. Mill’s position links happiness with morality and focused solely on the outcomes of an action. Philosopher John Kant’s theory emphasizes the importance of rationality,Read MoreCapital Punishment : Deontology Vs. Consequentialism1165 Words   |  5 Pages Capital Punishment: Deontology vs. consequentialism Subject: Analyze the deontological and consequentialist arguments on both sides of the issue of capital punishment in Gregg v Georgia. In this paper I will present the moral arguments of deontology and consequentialism used to determine whether or not using the death penalty was in fact constitutional. I will present both sides of the arguments and present them in the context of this trial and of similar situations where the arguments could

Wednesday, May 6, 2020

Imperial Presidency Free Essays

Richard Nixon’s presidency is labeled as ‘imperial presidency’[1] due to its hunt for and utilization of regal authority and supremacy. Certain other presidents in American history like Andrew Jackson and Theodore Roosevelt sought kingly control but that expansion in the executive power manifested the merits of that extension. During his presidency, Nixon and his administration put forward legislations to get the maximum control over such areas that remained exclusive domains of Congress like the power to declare war, the power of the purse, and the power of immunity from legislative oversight. We will write a custom essay sample on Imperial Presidency or any similar topic only for you Order Now This style of administration, absolute authority and legal privileges capacitated Nixon to involve Watergate scandal. Immunity from legislative oversight helped him to cover up his involvement in this scandal. His craving for a absolute authority and measures taken in this regard is best described by his attorney general, Elliott Richardson. He said that â€Å"a government of laws was on the verge of becoming a government of one man.† Despite these absolute powers, his government miserably failed in the domestic arena as he was unable to address the issues facing the American people. Notwithstanding his failure in the domestic affairs, Nixon attained extraordinary progress in the international affairs and explored new horizons for American foreign policy. He established reciprocal and positive relationships with china and was first American president to visit communist China. It goes to the credit of Nixon that he not only developed commercial relations with Russia but also succeeded in signing the Strategic Arms Limitation Treaty. This marked the beginning of steadier and constructive relations between the two super powers. [1] This term was first used by Arthur M. Schlesinger in his book ‘The Imperial Presidency’ in 1973.    How to cite Imperial Presidency, Essay examples

Monday, April 27, 2020

Software Configuration Management Essay Example

Software Configuration Management Essay In this world of rapidly changing technology, it has become a need for IT companies to have people working in parallel on Software projects across different geographical locations. Under these circumstances, using Software Configuration Management tools to keep track of all the changes in the code is the need of the times. This essay outlines the definition and primary characteristics of a Software Configuration Management system, and its role in any organization. It also explains the SCM Technology used by IBM ClearCase as an example of how SCM tools actually work.Full Text (907 words)In this era of rapid advancements in the world of Software Technology, there are Software developers working together on the same project across continents and geographical locations due to the evolution of the Global Delivery Model.   Projects now involve global teams working in parallel and modifying the same code base from different locations at the same time .Under these circumstances, the absenc e of a version control system would have caused the most unimaginable catastrophes. In the event of two programmers made changes to the same part of the code simultaneously, changes made by the second developer could undo or break the changes by the former, affecting the project dramatically. Tested features would disappear mysteriously, and the entire development could be marred by many such crippling and frustrating problems.To circumvent these problems however, all IT companies use a Software Configuration Management tool to keep track of all the changes in the code. According to the definition of SCM, â€Å"Configuration management is the discipline of developing uniform descriptions of a complex product at discrete points in its lifecycle with a view to controlling systematically the manner in which the product evolves.†Ã‚   (K.Narayanaswamy and W. Scacchi, Maintaining configurations of evolving software systems, IEEE Transactions on Software Engineering March 1987, Vol. 13 No. 4, pp. 323-334.)   As the definition clearly explains, Software Configuration Management keeps a track of all the changes made to all components, recording the way they contribute to every release. It is a boon for parallel development, and also for the growth of sub projects within a project..SCM tools primarily create a different version of the entire system for every user, and isolate the changes made by a developer from the rest of the code until the differences are resolved. The code is merged to the main label only after all conflicting merge points are taken care of, and it is ensured that the present changes will not have any undesired adverse effect on any other part of the code. They keep a track of the history of the source code, isolate files relevant to a particular task and reproduce the past releases. This is essential because software development goes through evolutionary phases. Initially after it’s release to the customer, there come in the defect fixing and enhancement requests for the next release. Hence if a bug is found at any point, it needs to be fixed in all the older versions also. For this we need to keep an exact snapshot of the previous versions which is done by SCM tools. These tools control the entire software and the release. They also provide security by having an authentication mechanism to validate the user before granting access the code repository.The kind of SCM tools used depends on the company’s requirements and the compatibility of the SCM tool with its code base. There are may SCM tools available in the market, like ClearCase , Microsoft Visual Souce Safe, CVS, RCS, PVCS and Synergy to name a few. Out of them, probably the most widely used and acclaimed is IBM’s Clearcase Version control system.   The ClearCase Version control system supports parallel development and inbuilt Build Management. Its strategy works equally well for LAN based or geographically distributed development environ ments. ClearCase has an inbuilt utility called â€Å"Multisite† which is used to create a copy of an entire repository across geographical locations. In this case, apart from support for parallel development, there is also a periodic sync up to keep the changes up to date across locations You could also call this WAN based ClearCase support. The various components of the ClearCase version management system are:-Version Object Base:The ClearCase system creates a Version Object Base (VOB) which is read-only repository storing information about the directories and files under its control. This is also a globally accessible database which requires proper authentication to access it. It keeps a record and reports actions, and its history records provide reproducibility and traceability. It has powerful concepts of branching and merging, which are extremely useful for parallel development.View:In the ClearCase system, every user has a private workspace, which is derived from a part icular set of rules defined in his/her configuration specification. This private workspace is called a view. Every view has a private data storage, and is isolated from the activities in other views.   All views have access to the VOB, and the access to the versions transparently and automatically.Metadata:The data which is related to VOB objects, but distinct from the contents of these objects is called Metadata. It consists of Event records created whenever any change is made to the VOB object. It keeps track of who modifies what data when and where in the VOBs. This is done by permanently stored and logically assessed information related to a particular object. Metadata also comprises of Labels and Branches. Labels are user defined tags used to identify files and directories. Branches are also tags, but they are used for parallel development and can be merged back to the main stream using the merge utility.By default, all files in ClearCase are read-only and you would need to c heck-out the files to make any modifications in them.   Once the changes are made, the files are checked in and integrated with the VOB. In Windows operating system, ClearCase gets automatically integrated with Internet Explorer so the VOBS can be viewed just like any other directory.