<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Memory-Leaks on Ghafoor's Personal Blog</title><link>http://ghafoorsblog.com/tags/memory-leaks/</link><description>Recent content in Memory-Leaks on Ghafoor's Personal Blog</description><generator>Hugo</generator><language>en</language><managingEditor>noreply@example.com (AG Sayyed)</managingEditor><webMaster>noreply@example.com (AG Sayyed)</webMaster><copyright>Copyright © 2024-2026 AG Sayyed. All Rights Reserved.</copyright><lastBuildDate>Fri, 15 May 2026 13:20:20 +0100</lastBuildDate><atom:link href="http://ghafoorsblog.com/tags/memory-leaks/index.xml" rel="self" type="application/rss+xml"/><item><title>Dealing With Memory Leaks</title><link>http://ghafoorsblog.com/courses/google/it-automation-content/it-automation-python-pcert/04-troubleshooting-debugging/05-module/005-dealing-with-memory-leaks/</link><pubDate>Tue, 11 Nov 2025 02:21:53 +0000</pubDate><author>noreply@example.com (AG Sayyed)</author><guid>http://ghafoorsblog.com/courses/google/it-automation-content/it-automation-python-pcert/04-troubleshooting-debugging/05-module/005-dealing-with-memory-leaks/</guid><description>&lt;p class="lead text-primary"&gt;
This document provides hands-on investigation of memory leaks through practical examples, demonstrating how applications exhaust memory through excessive allocations. It walks through using monitoring tools like top to identify memory growth patterns, applying Python's memory_profiler to pinpoint problematic code lines, and resolving issues where programs unnecessarily retain full data structures instead of minimal references.
&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="understanding-memory-requests"&gt;Understanding Memory Requests&lt;/h2&gt;
&lt;h3 id="why-applications-request-memory"&gt;Why Applications Request Memory&lt;/h3&gt;
&lt;p&gt;There are many reasons why an application may request a lot of memory. Sometimes it&amp;rsquo;s what&amp;rsquo;s needed for the program to complete its task. Sometimes it&amp;rsquo;s caused by a part of the software misbehaving.&lt;/p&gt;</description></item><item><title>How to Prevent Memory Leaks</title><link>http://ghafoorsblog.com/courses/google/it-automation-content/it-automation-python-pcert/04-troubleshooting-debugging/05-module/002-memory-leaks/</link><pubDate>Tue, 11 Nov 2025 01:46:01 +0000</pubDate><author>noreply@example.com (AG Sayyed)</author><guid>http://ghafoorsblog.com/courses/google/it-automation-content/it-automation-python-pcert/04-troubleshooting-debugging/05-module/002-memory-leaks/</guid><description>&lt;p class="lead text-primary"&gt;
This document explores memory leaks as a critical resource management issue where unreleased memory chunks accumulate over time, potentially causing system-wide performance degradation and process failures. It covers memory management differences between manual languages like C/C++ and garbage-collected languages like Python, diagnostic techniques using memory profilers, and strategies for identifying memory consumption patterns to prevent resource exhaustion.
&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="memory-management-fundamentals"&gt;Memory Management Fundamentals&lt;/h2&gt;
&lt;h3 id="application-memory-requirements"&gt;Application Memory Requirements&lt;/h3&gt;
&lt;p&gt;Most applications need to store data in memory to run successfully. Processes interact with the OS to request chunks of memory and then release them when they&amp;rsquo;re no longer needed.&lt;/p&gt;</description></item></channel></rss>