Cohen goes on to describe when and how to use each of these methods: * Basic - breakpoints * Primal - debug messages * Hot Shot - dynamic proxy * Brute Force - run-time profiler * New Age - through aspects A good overview - http://zvikico.typepad.com/problog/2007/11/five-ways-for-t.html Follow up discussion - http://www.theserverside.com/news/thread.tss?thread_id=47708&asrc=EM_NLN_2697526&uid=703565