Cohen goes on to describe when and how to use each of these methods:

* Basic - breakpoints
* Primal - debug messages
* Hot Shot - dynamic proxy
* Brute Force - run-time profiler
* New Age - through aspects

A good overview - http://zvikico.typepad.com/problog/2007/11/five-ways-for-t.html

Follow up discussion - http://www.theserverside.com/news/thread.tss?thread_id=47708&asrc=EM_NLN_2697526&uid=703565
