Special Topics in Networks Operation and Administration_Unit5_DB

Special Topics in Networks Operation and Administration_Unit5_DB

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Special Topics in Networks Operation and Administration Unit 5 Discussion Board Kregg M. Soltow November 3, 2011 American Intercontinental University What is memory leakage? As I have stated in my earlier posts, memory leakage is what happens when a software program or application takes use of system memory, but at the end of its process, does not return and discharge said memory to its machines operating system. Memory leaks can also be described as program objects stored within memory that in turn is inaccessible to the system running code. This of course is only the case in “object oriented programming”. (Erickson, 2003) Furthermore, confusion can be the cause of dismissal given that many symptoms of memory leakage are similar to other issues such as system cache. Given the frequency of this type of problem - generally - experienced programmers with granted access to any given program or application’s source code are needed to correctly diagnose the appropriate issue at hand. This lack of knowledge by a -
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/17/2012 for the course ITCO 101 taught by Professor Gugenhiem during the Spring '12 term at AIU Online.

Page1 / 3

Special Topics in Networks Operation and Administration_Unit5_DB

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online