For C ++:
Memory analysis tools:
1. c ++ Memory Leak Detector-memory validator (http://www.softwareverify.com/index.html)
2. Other as references: purify from IBM
Performance profiling tools:
For C #:
Compared with static code analysis, profiling is a dynamic analysis method for studying program behavior by collecting information during program running. The purpose is to locate the part of the program that needs to be optimized to improve the program running speed or memory usage efficiency. The following three methods are used to collect information when a program is running:
Event method: for Java, y
In the development process of Java program, it is unavoidable to encounter memory usage, performance bottleneck and so on. javaprofiler Tools Help developers locate these issues quickly and effectively, making them an important tool in the Java development process. At present, there are many kinds of JavaProfiler tools on the market, this article will briefly int
In the process of developing Java programs, it is unavoidable to encounter problems such as memory usage, performance bottleneck and so on. The Java Profiler Tool helps developers locate these issues quickly and efficiently, making it an important tool in the Java development process. At present, there are a variety of Java Profiler tools in the market, this article will briefly introduce several kinds of
survivor area. Then tidy up the two districts of survivor.
Full GCOrganize the entire heap, including young, tenured and perm. The full GC is slower than the scavenge GC, so the full GC should be minimized as much as possible. The full GC may be caused by the following reasons:
Dynamic changes in the domain allocation policy of the heap after the last GC
System.GC () is displayed call
Perm field is full
Tenured was written full
The Sun JDK also publishes a number of profiling tools with the release, which are basically based on the JVM Mangeapi and Sun JVM Attach API implementations, so what features can be found in the instructions for the JVM Manage API. Let's take a look at:First, functional tools1. JPS: Lists the process ID and process name of all JVM processes and implements the principle visible sun JVM Attach API2. Jinfo: P
Sometimes we need to perform performance tests on software programs that we develop, and some profilers tools are needed. 5 useful. NET profilers are listed below:1. JetBrains DottraceJetBrains Dottrace is a. NET Apps performance and memory Profile tool. It lets you quickly detect your. NET 1.0 to 4.5 application performance bottlenecks.Learn more about the Dottrace ' s product website2. ANTS Performance Pr
Performance analysis ToolsSoftware performance is an important point of inspection of software quality, whether online service programs or offline programs, or even terminal applications, performance is the key to user experience. There are two aspects of performance and stability that are mentioned in the major performance areas, and we have to focus on testing the performance and stability of the version when we do software testing. There are many ways to locate the performance problems found
1. Show variables like '%profiling% ';(View profiling information)
2. Set profiling=1; (open profiling)
3. Execute SQL query
Example: Select Goods_name from Ecs_goods where goods_id
Show Profiles;
4. S
capacityS1U:S1 already used sizePercentage of space used in Eden space on E-heapEc:eden Space Current capacity sizeSize of Eu:eden space already usedThe percentage of space used in the old area on the O-heapOc:old Space Current capacity sizeSize of ou:old space already usedPercentage of space already used in the P-perm space areaOc:perm Space Current capacity sizeSize of ou:perm space already usedygc-number of young GC occurrences from application boot to sampleygct– the time (in seconds) used
Original: http://yalung929.blog.163.com/blog/static/203898225201212981731971/Introduction: The top command, as one of the most commonly used performance analysis tools under Linux, can monitor and collect CPU,IO , and memory usage of the process. For example, we can Use the top command to get how much virtual memory (VIRT), physical
. The Robson proves that in this case a memory allocation may fail, but such a failure requires a special allocation and release order, which does not have the order of allocation release in SQLite. So in practice, the Robson limit can be exceeded without a bad effect.However, application developers should remember to monitor the state of the memory allocation subsystem and issue an alert when
Find the development and debugging tools. this post is based on the runtime profiling tool. lasthope is last edited on 2015-03-2412: 43: 03. a lot of include, require, nbsp; nbsp; is there a debugging tool like this?
This post was last edited by lasthope on 12:43:03A web page is often nested with many include, require. Is there a debugging tool like this? when I run a PHP page, it sends all the executed
->save_run ($xhprof _data, "Xhprof_yii");//Export the performance log to the folder you specified when you installed the extensionThen access the code you need to analyze to get a log file. F:\xhprof\xhprof_log\55fd13b01475f.xhprof_yii.xhprofThird, view the generated logConfigure a domain name, root directory to F:\xhprof\xhprof-0.9.4\xhprof_html.Access the domain name to view the log file you just generated.Resources Download:XhprofHttp://pecl.php.net/package/xhprofHttp://mirror.facebook.net/fa
Author Joachim Haagen skeie translator Li Yong posted on November 9, 2011 Domain Language Development theme tools, performance and scalability, Java Tag Performance tuning, open source Java sharing |
More than once, we all had the idea of trying to find out what was going on in the bottom of a running program. This need may be due to slow service, Java Virtual Machine (JVM) crashes, hangs, deadlocks, frequent JVM pauses, sudden or persistent high CP
process saves the previously read-in fields in buffer. The basic principle of Linux is that no resources should be wasted. Therefore, the core uses as much RAM as possible to cache information from local and remote file systems. When the system does read and write operations, The data associated with the currently running process is stored in RAM as much as possible. The system-reported cache is the sum of both the buffer and the page cache. The cache is not recycled at the end of the process
Pages_to_scan file defines the number of pages that can be scanned in a given scan. Any user can view these files, but users must have root permissions to modify them.There are also 5 monitored files (all read-only) that are exported via SYSFS, which indicate the operation and effectiveness of the KSMD. The Full_scans file indicates the number of full-zone scans that have been performed. The remaining 4 files indicate KSM's page-level stats:PAGES_SHARED:KSM The number of non-exchangeable kernel
not improve efficiency, but will reduce efficiency, because there is a lock upgrade process, this time will need to-xx:-usebiasedlocking to disable the biased lock. Here are the comparison of these types of locks:
Lock
Advantages
Disadvantages
Applicable scenarios
Biased lock
Locking and unlocking does not require additional consumption, and the execution of a non-synchronous method is less than the nanosecond-level gap.
If there
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.