Nutanix Interview Preparation and Recruitment Process


About Nutanix


Nutanix, Inc., founded in 2009 by Dheeraj Pandey, Mohit Aron, and Ajeet Singh, is a San Jose, California-based company specializing in cloud software and hyperconverged infrastructure (HCI). It provides a unified platform for managing applications and data across hybrid multicloud environments, including on-premises datacenters, public clouds (AWS, Azure, Google Cloud), and edge locations.

Nutanix Technical Interview Questions

Nutanix’s core offerings include the Nutanix Cloud Platform, which integrates compute, storage, virtualization, and networking, supporting diverse workloads like enterprise applications, AI, databases, and virtual desktops. Key products include Acropolis Hypervisor (AHV), Prism (management software), Nutanix Cloud Clusters (NC2), and Nutanix Unified Storage.

The company pioneered HCI, combining traditional server, storage, and virtualization silos into a single, software-defined solution. It transitioned from hardware appliances to a software-focused, subscription-based model in 2021, emphasizing scalability, simplicity, and cost-efficiency. Nutanix supports multiple hypervisors (AHV, VMware ESXi, Microsoft Hyper-V) and container platforms, catering to industries like automotive, healthcare, education, and finance. It operates globally, with offices in over 35 countries, and collaborates with partners like Cisco, Dell, Microsoft, and NVIDIA.

Financially, Nutanix is publicly traded (NASDAQ: NTNX) with a market cap of $19.5 billion as of March 2025 and trailing 12-month revenue of $2.32 billion. It has raised $317 million in funding from investors like Lightspeed Venture Partners and Goldman Sachs. The company employs around 8,239 people as of 2023 and is noted for a positive workplace culture, with a 4.2/5 Glassdoor rating and 90% employee approval on Great Place to Work surveys.

Competitors include VMware, Dell EMC, HPE (SimpliVity), and NetApp. Nutanix has benefited from customer shifts away from VMware post its 2023 Broadcom acquisition, with reported revenue growth and a net profit of $56.4 million in Q2 2025. However, it faced challenges like a 2020 furlough of 1,500 employees due to COVID-19 and a 2022 dispute with MinIO over software license violations. Recent initiatives focus on AI integration, sustainability, and partnerships, such as with Pure Storage and Omnissa, to enhance storage and virtual desktop solutions.



Nutanix Recruitment Process


The Nutanix recruitment process varies by role (fresher, intern, or experienced) and location but generally involves 2–5 rounds designed to assess technical skills, problem-solving, and cultural fit. Below is an overview based on available information, focusing on common patterns for freshers and interns, with some insights for experienced hires.

Recruitment Process for Freshers


Typically consists of 2–4 rounds, with an emphasis on technical and coding skills:

1. Online Coding Round (60–90 minutes)


* Conducted on platforms like HackerRank, Zoom, or Google Meet.

* Candidates solve 2–3 medium-level coding problems.

* Topics include data structures (arrays, linked lists, trees, graphs), algorithms (dynamic programming, greedy, searching/sorting), and occasionally operating systems or networking basics.

* Example questions: Implement a calculator class, link nodes at the same level in a BST, or solve max subarray problems.


2. Debugging Round (Optional)


* Candidates fix logical errors in provided code snippets.

*
Focuses on understanding code flow and problem-solving under constraints.

*
Example: Fix issues in code related to the Reader-Writer problem (an OS concept).


3. Technical Interview (1–2 rounds, 45–60 minutes each)


* Conducted via Zoom or in-person, focusing on in-depth technical knowledge.

*
Topics: Data structures and algorithms (e.g., LRU Cache, DFS, BST operations), operating systems, networking, virtualization, cloud computing, and Linux commands (e.g., scp, sed, ls -ltr).

*
For roles like Systems Reliability Engineer (SRE), coding may not be required, but strong knowledge of OS, networking, cloud, and Linux is critical.

*
Behavioral questions may assess problem-solving approaches or past project experiences.


4. HR/Managerial Round (30–60 minutes)


* Evaluates cultural fit, communication skills, and career goals.

* Questions may include: “Tell me about a time you made a mistake and what you learned” or “How do you prioritize requirements?”

* For freshers, this round is often lighter, focusing on enthusiasm and alignment with Nutanix’s values (e.g., innovation, customer obsession).

Duration: Typically takes 1–2 weeks, though it can extend to 3–4 weeks for some roles.  

Eligibility Criteria:


* Bachelor’s degree in Computer Science or a related field (advanced degrees preferred for some roles).

* Strong knowledge of programming (C++, Python, Java), OS, networking, and cloud concepts.


Recruitment Process for Interns


Nutanix’s internship program is competitive, targeting students for roles like software engineering, cloud engineering, or product marketing. The process mirrors the fresher process but is tailored to assess potential and learning ability:

Application Screening
* Candidates apply through Nutanix’s career portal, university programs, or platforms like LinkedIn/Naukri.

* Resumes are screened for relevant coursework, projects, or skills (e.g., C++, distributed systems, networking).

Coding/Technical Assessment
* Similar to the fresher coding round, with 1–2 coding questions on platforms like HackerRank.

* Emphasis on problem-solving and basic technical knowledge (e.g., DSA, OS basics).

Technical Interview
* Focuses on projects listed in the resume, basic DSA, and role-specific skills (e.g., cloud concepts for cloud engineering interns).

* Interns report hands-on tasks that contribute to real company projects, so interviewers may test practical understanding.

HR/Team Fit Interview
* Assesses soft skills, enthusiasm, and alignment with Nutanix’s culture.

* Questions like: “Why Nutanix?” or “How do you approach learning new technologies?”

* Many interns convert to full-time roles, so this round gauges long-term potential.

Duration: Often faster, around 1–2 weeks, especially for campus hiring.  


Recruitment Process for Experienced Hires


For roles like Software Engineer, SRE, or managerial positions, the process is more extensive, often involving 4–8 rounds:

Resume Screening
* Applications via Nutanix’s career portal, LinkedIn, or referrals. Strong emphasis on relevant experience (e.g., virtualization, cloud, Linux).

Phone Screening (30–45 minutes)
* Conducted by a recruiter to discuss background, role fit, and Nutanix’s expectations.

* May include basic technical questions (e.g., “Explain ARP or traceroute”).

Technical Rounds (2–4 rounds, 45–60 minutes each)
Deep dives into role-specific skills:

*
For SDE: DSA (e.g., invert a binary tree, implement BST), system design, and distributed systems.

*
For SRE: Linux troubleshooting, networking, virtualization, and cloud architecture.

*
For QA: Testing methodologies, automation (Python), and bug identification.

*
Case studies or scenario-based questions (e.g., “Troubleshoot Wi-Fi failure”).

Managerial/Panel Round
* Involves discussions with senior managers or cross-functional teams.

* Focuses on leadership, cross-team collaboration, and handling challenges.

HR Round
* Covers salary expectations, cultural fit, and relocation (if applicable).

* May include negotiations or discussions about Nutanix’s hybrid-first work model.

Duration: Averages 2–6 weeks, with some processes taking up to 2 months due to multiple rounds.  


Key Preparation Tips


Technical Skills:
* Master 1–2 programming languages (Python, C++, Java).

* Study core topics: DSA, OS, networking, cloud computing, virtualization, and Linux.

* Practice coding on HackerRank or LeetCode (medium-level problems).

* For SRE roles, focus on non-coding skills like Linux commands, cloud basics, and troubleshooting.

Resume:
* Highlight relevant projects, internships, or skills (e.g., distributed systems, VMware ESXi).

* Tailor your resume to the job description.

Interview Etiquette:
* Be honest, confident, and maintain clear communication.

* Smile and engage positively, as noted by a successful SRE candidate.

* Research Nutanix’s products (Acropolis, Prism, NC2) and its hybrid multicloud focus.


Insights from Candidates


* Positive Experiences: Many candidates report smooth processes, clear communication, and friendly interviewers. Bengaluru interviews, in particular, are noted for being well-coordinated.

* Challenges: Some candidates find the process lengthy (6+ hours of interviews) or note inconsistent feedback, with a few experiencing toxic interviewers (though rare).

* Fraud Alert: Nutanix warns of recruiting scams using fake Gmail accounts. Verify communications via official channels (careers.nutanix.com) and report suspicious activity to recruiting-scams@nutanix.com.


Additional Notes


* Campus Recruitment: Nutanix actively hires through university programs, with streamlined processes (1–2 weeks). Coding tests are common, followed by technical and HR interviews.

* Diversity and Inclusion: Nutanix promotes a diverse workplace through employee-led L.I.F.E. groups and equal opportunity policies.

* Locations: Major hiring hubs include Bengaluru and Pune (India), San Jose (USA), and other global offices.

* Roles: Common roles include Software Engineer, SRE, QA Engineer, Technical Support, and Product Manager. Internships often lead to full-time offers.

Nutanix Interview Questions :

1 .
What does Nutanix offer in terms of technology solutions?
Nutanix offers hyperconverged infrastructure (HCI) solutions that integrate computing, virtualization, and storage into a single platform. Their technology simplifies data center management by consolidating hardware and software resources, enhancing scalability and agility. Nutanix also provides cloud services and software-defined storage, enabling organizations to build and manage hybrid and multicloud environments seamlessly.
2 .
How does Nutanix utilize the concept of hyperconvergence?
Nutanix leverages hyperconvergence by integrating compute, storage, and networking into a single software-defined solution. This approach eliminates traditional silos and simplifies infrastructure management, making it easier to scale and manage resources. Nutanix’s hyperconverged infrastructure (HCI) architecture enhances agility and efficiency by pooling resources across servers and enabling centralized management through a unified interface.
3 .
What are the key features of Nutanix’s Acropolis Hypervisor (AHV)?
* Native, enterprise-grade hypervisor

* Simplified virtualization management

* Built-in security features

* Efficient resource utilization

* Seamless integration with Prism management interface
4 .
What is the role of Prism within the Nutanix ecosystem?
Prism is the management interface for the Nutanix ecosystem, offering a centralized platform to manage virtualized infrastructure. It includes monitoring, automation, and self-service, allowing administrators to optimize computing, storage, and networking resources through a single pane of glass. Prism streamlines provisioning, scaling, and troubleshooting across Nutanix clusters, enhancing operational efficiency and ensuring strong performance in enterprise IT environments
5 .
What are the primary advantages of Nutanix’s HCI over traditional setups?
* Simplified management
* Reduced hardware footprint
* Increased scalability
* Improved performance
* Lower total cost of ownership (TCO)
* Seamless integration with virtualization platforms and cloud services
6 .
What do you know about hyperconverged infrastructure? Why should the company consider it for its own infrastructure?
By integrating x86-based server resources with intelligent software in a unified software-defined solution, hyperconverged infrastructure simplifies the deployment, management, and scaling of data centre resources. To develop an agile data centre that scales with your business, separate servers, storage networks, and storage arrays can all be replaced with only a single hyperconverged system. It dismantles 3-tier infrastructure's outdated storage silos, reducing complexity and enabling better performance and resilience.


HCI is made up of only two main components: two planes.

* The distributed plane distributes storage, virtualization, and networking capabilities to guest programs, whether they're VMs or container-based workloads, across a cluster of nodes.

* The management plane allows you to manage HCI resources from a single location with a single perspective. It removes the need for separate server, storage network, storage, and virtualization management systems.]

The company should consider it for the following reasons:

* Costs: Although HCI is a significant investment, it pales in comparison to the expenditures of maintaining and updating typical SAN infrastructures. With the installation of hyperconverged infrastructure, multiple suppliers and software licensing, paying for specialists, growing power and cooling costs, and the cost of providing storage can all be considerably reduced.

* Complexity: When it comes to datacenters and datacenter management, the list of silos, racks, servers, cables, distinct management interfaces, multiple suppliers, shelfware...the list is endless. HCI is a technique to "clean up" your datacenter by integrating critical pieces, lowering footprint, and administering your complete infrastructure from a single interface.

* Cloudability: IT environments are becoming more multi-cloud, although the legacy infrastructure isn't designed to help businesses succeed in this context.

* Putting an end to the famed 80/20 rule: Is it true that you spend 80% of your money on keeping the lights on and only 20% on innovation? That alters with HCI, which offers automation, self-service, growing on a pay-as-you-grow basis, and more time to concentrate on high-value business tasks
7 .
What is the advantage of a ternary search tree over trie?
In contrast to the trie(standard) data structure, which has 26 pointers for its offspring, every node in a ternary search tree only has three:

* The left pointer is pointing to the node whose value is lower than the current node's value.

* The equal pointer leads to a node whose value is the same as the current node's value.

* The right pointer leads to the node whose value exceeds the current node's value.

Aside from the three-pointers mentioned above, every node has a field for indicating data (character in the case of a dictionary) and a field for indicating the end of a string.

One advantage of employing ternary search trees over attempts is that ternary search trees take up less space (only three-pointers each node in comparison to 26 in standard tries). In addition, ternary search trees can be utilised in any situation where a hashtable is used to hold strings. Tries are appropriate whenever there is a balanced mix of words throughout the alphabets, allowing for the most efficient use of space. Aside from that, ternary search trees are preferable. Whenever the strings to be maintained all have the same prefix, ternary search trees are the most economical (in terms of space).
8 .
What types of applications are available in the enterprise cloud?
From legacy software to new cloud-native apps provided on mobile devices, Enterprise Cloud is well-suited to run the applications that businesses have grown to rely on. The following are some of the most prevalent applications that run in the Enterprise Cloud:

* Oracle databases and E-Business Suite, SAP Business Suite, Microsoft SQL Server, Microsoft Dynamics, IBM DB2, and many other business-critical applications

* Microsoft Exchange and SharePoint, as well as unified communication solutions like Cisco UC, Avaya Aura, and Microsoft Skype for Business, are examples of messaging and collaboration apps.

* Multi-hypervisor compatibility for VMware ESXi, Microsoft Hyper-V, and Nutanix AHV virtualization for server virtualization and private clouds

* Splunk, Hadoop, MongoDB, elastic, and other big data and cloud-native apps

* Application virtualization and virtual desktop infrastructure (VDI)

* Deployments of Remote Office and Branch Office (ROBO)

* Puppet, Docker, and Chef are examples of development/testing apps.
9 .
What are the various levels of cloud storage?
Files: They are nothing but data collection. In files, data is saved in the same format. We use files in directories, development platforms, and repositories. Folders house files.

Datasets: They are collections of data in table form.

Blocks: They store a large volume of data themselves. Blocks are kept on hard drives.

Objects: Data, its metadata, as well as identifiers are organized as web-based resources. Objects are usually stored in repositories. So we can scale them smoothly.
10 .
What are the limitations of the Selenium Web Driver?
Following are a few limitations of the Selenium Web Driver.

* Developers must have sound programming skills to design test cases.
* We need to build different modules.
* We cannot perform cross-platform tests.
* We cannot test Windows-based applications using the Selenium Web Driver.
* Test maintenance is usually time-consuming.
* The test reports don’t reveal much information.
11 .
In Selenium, What is the difference between a linktext and a partial linktext locator?
We use a linktext locator to locate elements on a web page. It means the linktext locator matches the text inside an anchor tag.

A partial linktext locator, on the other hand, uses only a portion of text to locate elements on a web page. It means no exact string match takes place to locate elements on a web page. This locator matches the text inside an anchor tag partially.
12 .
Compare the MAC address and IP address.
IP Address MAC Address
IP is the short form of Internet Protocol. MAC is the short form for Media Access Control.
It is a four-byte or sixteen-byte hexadecimal address. It is a four-byte hexadecimal address.
It is the logical address of a computer. It is the physical address of a computer.
It works at the network layer. It works at the datalink layer.
We can use IP addresses for broadcasting as well as multicasting. We can use MAC addresses for broadcasting.
13 .
How can you skip a TestNG test during execution?
We can skip running a testNG test in the following ways:

* While running tests, we can use the parameter ‘enabled=false’. And by default, this argument is set to ‘true’.

* We can use a condition check. If the condition is met, then the test throws a ‘SkipException’ and skips the test.

* If we wish to skip a test, we can use the below command.
14 .
How is a trigger different from a view?
A trigger is a special procedure or function. It is automatically executed in response to events. The events can be data manipulation statements such as DELETE, INSERT, and UPDATE. A trigger works based on the event-condition-action rule. It means whenever an event occurs, a specific condition is tested. If the condition is met, then there will be definite action.

In its most basic form, a view is a virtual table. A virtual table shows the data from numerous tables. We can only view the data but not modify it. It is important to note that databases store a ‘view definition query’, but they don't store the contents of a view.
15 .
Is the enterprise cloud software-based or hardware-based?
It's all about the software in this case! Multi-Cloud operations are made possible by the software. Regardless of the hardware you choose, whether it is Nutanix, HP, Dell, Cisco, Lenovo, or IBM, Enterprise Cloud software converges private, public, and distributed clouds, giving more simplicity to infrastructure and application management.
16 .
What is the difference between a public cloud and an enterprise cloud?
An enterprise cloud is a unified IT operating environment that combines private, public, and distributed clouds, allowing administrators to manage infrastructure and applications in any cloud from a single location. For both cloud operators and consumers of cloud-delivered services and apps, the enterprise cloud provides a consistent, high-performance, and seamless experience. The enterprise cloud is a concept for IT infrastructure and a platform service that combines the benefits of public cloud services with the value of private data centre settings for enterprise applications.
17 .
Explain the reference counting mechanism in context to Garbage Collection.
From the beginning, the reference counting mechanism has been a very old Garbage Collection technique. Each object in the reference counting approach has a track of the number of pointers to it from various objects and the stack. When a new item refers to it, the counter is increased by one. When an object's reference is lost, the counter is decremented by one. When the count hits '0,' the garbage collector can de-allocate the object.

When allocating to a new object, the main advantage of the reference counting approach has been the low amount of work per memory write. However, it has serious difficulty with data cycles. When the first object is referred to by the second object, and the second object is referred to by the first (cyclic references), the count never reaches 0, and the objects are never garbage collected.
18 .
Discuss OutOfMemoryError Exception in Java.
OutOfMemoryError exception is usually thrown whenever the Java Virtual Machine runs out of memory and cannot allocate an object. The trash collector was unable to release any more memory. OutOfMemoryError frequently indicates that you're doing something incorrectly, such as holding on to objects for too long or processing too much data at once. It can also suggest an out-of-control issue, as in a third-party library that caches strings or perhaps an application server that doesn't clear up after deployments. And it doesn't always have anything to do with the items on the heap. When a native allocation cannot be satisfied, the java.lang.OutOfMemoryError exception can be thrown by native library code (for example, if swap space is low). Let's look at some of the scenarios in which the OutOfMemory issue can occur.

* Java heap space: This problem is caused by applications that utilise too many finalizers. If a class does have a finish method, trash collection does not reclaim space for objects of that kind. Instead, the objects get queued for finalisation, which happens later after garbage collection.

* GC Overhead limit surpassed: This error means that the garbage collector is constantly operating and that the Java application is progressing very slowly. A java.lang.OutOfMemoryError is thrown after a garbage collection if the Java process spends more than approximately 98 per cent of its time doing garbage collection and recovers less than 2% of the heap and has done so far the last 5 (compile-time constant) subsequent garbage collections.

* Metaspace: Metadata for Java classes is stored in native memory. Assume that the metaspace for class metadata has been depleted, as in java.lang. The exception OutOfMemoryError with a detail MetaSpace is thrown. A java.lang.OutOfMemory Exception is thrown when the amount of native memory required for class metadata surpasses MaxMetaSpaceSize. The exception OutOfMemoryError with a detail MetaSpace is thrown.

* Requested array size exceeds VM limit: This phrase implies that the application tried to allocate an array that was larger than the heap capacity.

* Permgen space is thrown: The PermGen space error means that the memory space allocated to the Permanent Generation has been used up.

* Out of swap space: This apparent exception happens when a native heap allocation fails and the native heap is nearing exhaustion. Operating-system-level faults are frequently the cause of the java.lang.OutOfMemoryError: Out of Swap Space error.

* reason stack_trace_with_native_method: When this error message (reason stack trace with the native method) is thrown, a stack trace with a native method as the top frame is printed. This indicates that a native method has experienced an allocation failure.
19 .
Define encapsulation in context to OOPS.
The concept of encapsulation (or OOP Encapsulation) in object-oriented computer programming (OOP) languages refers to the bundling of data and the functions that operate on that data into a single unit. Encapsulation is commonly used in the form of classes in several programming languages. A class is a type of program-code template that allows programmers to design objects with both variables (data) and behaviours (functions or methods). In computer science, a class is an example of encapsulation since it consists of data and procedures that have been bundled into a single unit.

Encapsulation can also refer to a mechanism that prevents users from directly accessing specific components of an object, such as state values for all of the object's variables. Data members as well as data functions or methods linked with an instantiated class or object can be hidden via encapsulation.

There are a few fundamental advantages of encapsulation in programming. These are some of them:

* Data hiding: Users will have no notion how classes are built or stored because data will be hidden. Users will only be aware of the fact that values are being given and initialised.

* Easy to Adjust and Adapt to New Requirements: Encapsulation makes it simple to change and adapt to new requirements.

* More flexibility: You can choose whether to make variables red or write-only. SetName(), setAge(), and setWriteOnly() are some examples. To make variables write-only, simply omit the get methods like getName(), getAge(), and so on.
20 .
What do you understand by the term 'virtualization'? What are its benefits?
The procedure of running a virtual instance of a computer system in a layer separate from the actual hardware is known as virtualization. It usually refers to running multiple operating systems on the same computer at the same time. It may appear to applications running on top of the virtualized machine that they are on their own dedicated computer, with their own operating system, libraries, and other programmes that are unrelated to the host operating system that sits underneath it. Hypervisor software separates physical resources from virtual environments or the entities that use those resources. Hypervisors can run on top of an operating system (like on a laptop) or be installed directly on the hardware (as on a server), as most businesses do. Hypervisors divide up your physical resources so that virtual environments can access them.

From the real environment to the multiple virtual environments, resources are partitioned as needed. Within the virtual environment, users interact with it and execute computations (typically called a guest machine or virtual machine). The virtual machine is a single data file that runs. And, like any other digital file, it can be transferred from one computer to another, opened in either, and expected to function correctly. When a user or program issues an instruction that requires additional resources from the physical environment while the virtual environment is running, the hypervisor relays the request to the physical system and caches the changes—all at near-native speed (especially if the request is sent through an open-source hypervisor based on KVM).

Benefits of virtualization:

* Resource allocation is more flexible and efficient.

* Increase the efficiency of development.

* It lowers IT infrastructure costs.

* Remote access and fast scalability.

* Disaster recovery and high availability.

* Allows for the use of multiple operating systems.

* Management of data centres.

* Reduces downtime to a minimum.

* Provisioning procedure is sped up.

* Improved responsiveness and resource availability.
21 .
Multiply two numbers using bitwise operators.
The Russian peasant algorithm is an intriguing method. The goal is to keep doubling the first number while halving the second until the second number never becomes 1. Then add the first number to the result anytime the second number becomes odd during the operation (result is initialised as 0).
// C++
unsigned int multiply(unsigned int x, unsigned int y)
{
   int ans = 0; // initialise the ans variable

   // While the second number is not equal to 1
   while (y > 0)
   {
       // If second number is odd, we  will add the first number to ans
       if (y & 1)
           ans = ans + x;

       // then multiply the first number by 2 and divide the second number by 2
       x = x << 1;
       y = y >> 1;
   }
   return ans;
}​

* Time Complexity: O(log2y)
* Auxiliary Space: O(1)

If y is even, the value of x*y is (x*2)*(y/2); otherwise, the value is ((x*2)*(y/2) + x. We keep multiplying 'x' by 2 and dividing 'y' by 2 in the while loop. We add 'x' to 'ans' if 'y' is odd in the loop. The answer is obtained when the value of 'y' equals 1, and the value of 'ans' + 'x' equals 1. When 'y' is a power of two, the 'ans' remains 0 and the multiplication is done by 'x'.
22 .
How can you delete a value from a linked list if you have a pointer to it? It's important to note that no other node, not even the head, is provided with a pointer.
The approach is to copy the data from the next node to the node that will be erased, then delete the node that will be deleted.
void delNode(ListNode* ptr)
{
   // If the node to be deleted is the
   // last node of linked list
   if (!ptr->next)
   {
       free(ptr);
       // this will simply make the node_ptr NULL.
       return;
   }
    
   // if node to be deleted is the first or
   // any node in between the linked list.
   ListNode* temp = ptr->next;
   ptr->val = temp->val;
   ptr->next = temp->next;
   free(temp);
}​

It's vital to keep in mind that this method will only operate if the given reference does not point to the last node. Because you don't have the following node to copy the info from if it's the last node. We can make the final node a dummy node to make this solution work. However, the programs/functions that use this function should be changed as well.
23 .
Implement the Sieve of Eratosthenes in 0(n) time complexity.
For any i where i ranges from 2 to N-1, examine the number to see if it is prime. If somehow the number is prime, it should be placed in the prime array. For each prime number j less than or equal to the lowest prime factor p of i, the following formula is used:

* Make all i*p numbers non-prime.
* Assign j to the lowest prime factor of i*p.

const long long MAX_CAP = 1000001;
 
// is_prime[] : is_prime[i] is true if the number i is prime
// prime[] : stores all the prime number less than N
// SPF[] : stores the smallest prime factor of a number
// [for Exp : smallest prime factor of '4' and '20'
// is '2' so we put SPF[4] = 2 , SPF[20] = 2 ]
vector<long long >is_prime (MAX_CAP , true);
vector<long long >prime;
vector<long long >smallest_prime_factor (MAX_CAP);
 
// function that generates all prime numbers less than N in O(n) time
void Seive(int N)
{
    // 0 and 1 are not prime
    is_prime[0] = is_prime[1] = false ;
 
    // Fill the other entries
    for (long long int i = 2; i < N ; i++)
    {
        // If is_prime[i] == true, then i is a
        // prime number
        if (is_prime[i] == true)
        {
            // push i into the prime vector
            prime.push_back(i);
 
            // A prime number  itself is its own smallest
            // prime factor
            smallest_prime_factor[i] = i;
        }
 
        // Remove all multiples of i*prime[k] which are
        // not prime by making is_prime[i*prime[j]] = false
        // and set the smallest prime factor of i*prime[j] to prime[j]
        // this loop will run only once for the number which is not prime
        for (long long int k = 0;
             k < (int)prime.size() &&
             i*prime[k] < N && prime[k] <= smallest_prime_factor[i]; k++)
        {
            is_prime[i*prime[k]] = false;
 
            // put the smallest prime factor of i*prime[j]
            smallest_prime_factor[i*prime[k]] = prime[k];
        }
    }
}​
24 .
The company is in need of storage. How can HCI assist the company in this situation?
Data is rising at a rate of 50% or more each year, and it is being stored on the block, file, or object storage systems. New visibility and control requirements are putting more pressure on storage managers. And cloud storage has grown in importance to the point where it must be incorporated in whatsoever storage architecture. Legacy storage infrastructure, on the other hand, is unable to meet the demands imposed by these new realities. It's compartmentalised, which adds to the complexity, inhibits flexibility, and lowers usage. Legacy infrastructure does not provide enough data visibility to fulfil the new compliance or control requirements. It was created before the cloud, making the deployment of cloud-like capabilities extremely challenging.

HCI dismantles silos and consolidates all assets into a single, easy-to-manage resource. The more "invisible" infrastructure there is, the greater, and HCI expands that invisibility to storage. With HCI, you may create a cluster with a range of nodes depending on your needs at the time—storage-heavy nodes whenever you need storage, CPU-heavy nodes whenever you need computation, and so on.

Frequently Asked Questions



1. How many rounds of interviews do I have to go through at Nutanix?

At Nutanix, you must go through four rounds of interviews.


2. Why should I work at Nutanix?

Nutanix is a company that offers several services in cloud computing. When it comes to cloud computing, it is a technology that many companies across the globe are increasingly using. If you are hired, you will have an assured career in the future.


3. Is the Nutanix interview tough to crack?

No, if you are familiar with cloud computing and core computer concepts, you will breeze through the Nutanix interview. Simply put, it depends on your efforts in interview preparation.


4. What are the four rounds of Nutanix interviews?

The four rounds of Nutanix interviews are coding, technical, debugging, and HR.


5. What are the most challenging questions in the Nutanix interview?

The coding, debugging, and technical round questions may come up with a few tough ones. However, if you have done your homework better, you will breeze through them effortlessly.


6. What are the tricky questions asked in the Nutanix interview?

In the technical and HR rounds, interviewers will pose situational and behavioral questions to gauge your attitude and managerial qualities. So you need to be careful while answering these types of questions.


7. What is the compensation range for software professionals in Nutanix?

Nutanix offers about 15 LPA to candidates with 3-4 years of experience.


8. How will I get selected for Nutanix?

You must go through four rounds of interviews in Nutanix, including coding, debugging, technical interviews, and an HR interview.


9. How do I get an internship with Nutanix?

Nutanix internship programme is designed to give you hands-on exposure to the team and culture while allowing you to create, develop, and demonstrate your abilities. By the end of August, Nutanix starts accepting applications for the following summer. Qualified candidates will then be invited to a series of phone or video interviews, as well as a small assignment. While this is the standard timeline, you are free to apply for opportunities that interest you at any moment.