How Do You Troubleshoot “ERROR: Hadoop common not found” when Running Hadoop?

Problem Scenario
You run an HDFS command, but you get this message: “ERROR: Hadoop common not found”

What should you do?

Solution
As the hduser or user that runs hdfs, log in. Run echo $HADOOP_HOME

That directory should have a libexec directory with a file called hadoop-config.sh.

Run this: ls -lh $HADOOP_HOME/libexec

One way to create it is this: 1) find a hadoop-config.sh file (e.g.,

How Do You Find the Static Blocks or Columns in WordPress?

Problem scenario
You know how to find the individual postings. You know how to find the main pages in WordPress. But how do you find your advertisers and sidebars on your site (to edit them)?

Solution
In WordPress, go to Appearance -Themes. Choose the theme that applies to your site. On the main part of the screen, click/browse to the area of your site that has the blocks,

How Is Instantiation Different from Initialization of a Java Variable?

Question
Variables in Java store data (e.g., a string or number). How is instantiation of a variable different from initialization, or are they the same?

Answer
Instantiation is different from initialization. Instantiation is the creation of the variable (e.g., through the Java syntax or invocation of a method that creates the variable). A class can be instantiated or a primitive variable can be instantiated.

How Do You Record a Greeting on a Phone That Gives You Privacy?

Problem scenario
You must record an audible greeting for a voicemail. You do not want to use your voice. What should you do?

Solution
1. Go to this website: https://wideo.co/text-to-speech/.

2. Enter this text (but substitute 212-123-4567 with your phone number:

Hello, you have reached 2,1,2,1,2,3,4,5,6,7. No one is available to take your call,

Should You Notify the Sender of Receiving an Unintended Email?

Problem scenario
You received an email that you should not have. The footer requests you let the sender know and delete the copy you received. What should you do?

Solution
We think you should not examine the contents closely, delete the email and let the sender know. There may be a disclaimer boilerplate in the email that may or may not have legal weight.

How Do You Remove a 3M Hook from a Wall without Removing the Paint?

Problem scenario
You affixed some 3M tape to a wall. You want to remove it without damaging the surface it is attached to. What do you do?

Solution
With 3M tape (double sided tape to hold or affix a sensor), remember to pull it straight down parallel to the wall (rather than pulling it away from the wall). If this tape stretches enough,

What is the Definition of a Security insofar as the Securities and Exchange Commission is Concerned?

Problem scenario
You want to know if a security should be registered with the SEC based on the Securities Act. When is an asset considered to be a security?

Solution
It depends on if it is an investment contract. The 1946 lawsuit of SEC v. W.J. Howey Co., 328 US 293 provides guidance or a test. https://supreme.justia.com/cases/federal/us/328/293/

The four criteria for a scheme or asset for the “Howey Test” are as follows:

  1. An investment of money
  2. In a common enterprise
  3. With the expectation of profit
  4. To be derived from the efforts of others

(The four points were taken from https://www.investopedia.com/terms/h/howey-test.asp;