Product Reviews

Optimization the Smart Way

AQTime helps you target problem code

Do you know which ten functions in your application account for the most time during an average run? What percentage of your code is actually visited by your test suite? Are you freeing all the memory that you allocate?

If you don't know the answer to these questions, then your toolbox is probably lacking a profiler. One excellent choice for filling that gap is AQTime, from AutomatedQA (makers of AQTest, which I reviewed in the last issue of Developer Central). If you're using Microsoft Visual C+ or Visual Basic, Borland Delphi or C++ Builder, or the gnu gcc compiler, AQTime can give you a detailed look at what's going on when you run your application.

AQTime is simple to use. Open it, load your executable application, choose a type of profiling to do (for example, a line-by-line coverage profile, or a function time profile), and hit the run button. Then use your application as you normally would, while AQTime collects the data. When you exit your application, the results are right there, with a variety of views from functional diagrams to bar charts of relative times to numeric results.

Of course AQTime also integrates with AQTest, giving you an ideal way to see whether your test suite covers all the code in your application, and integrating performance data with bug hunting. There's even an integrated source code editor so you can see just what code is contained in the problem functions.

Some applications can get away without optimization. If yours is one of those, great. If not, the cost of AQTime can easily be saved in helping you focus just on the pieces of code that need the most work in pursuit of efficiency.

About the Author

Mike Gunderloy, MCSE, MCSD, MCDBA, is a former MCP columnist and the author of numerous development books.

Featured

  • Google IDs on Azure Active Directory B2B Service Now at 'General Availability'

    Microsoft announced on Wednesday that users of the Google identity and access service can use their personal log-in IDs with the Azure Active Directory B2B service to access resources as "guests."

  • Top 4 Overlooked Features of a Data Backup Strategy

    When it comes to implementing an airtight backup-and-recovery plan, these are the four must-have features that many enterprises nevertheless tend to forget.

  • Microsoft Bolsters Kubernetes with Azure Confidential Computing

    Microsoft on Tuesday announced various developments concerning the use of Kubernetes, an open source container orchestration solution fostered by Google.

  • Windows Will Have Support for Encrypted DNS

    Microsoft announced this week that the Windows operating system already has support for an encrypted Domain Name System option that promises to add greater privacy protections for Internet connections.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.