{"id":71945,"date":"2024-06-03T16:54:06","date_gmt":"2024-06-03T16:54:06","guid":{"rendered":"https:\/\/www.azul.com\/?post_type=glossary&#038;p=71945"},"modified":"2024-06-03T16:54:09","modified_gmt":"2024-06-03T16:54:09","slug":"dead-code","status":"publish","type":"glossary","link":"https:\/\/www.azul.com\/ja\/glossary\/dead-code\/","title":{"rendered":"Dead Code"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"what-is\">What is Dead Code?<\/h2>\n\n\n\n<p>Dead code resides in an application\u2019s codebase but is not used by the application. Removing dead code significantly reduces the burden of maintaining the codebase and makes it easier to understand. Developers want to remove dead code but are terrified of doing so because the process of identifying and removing dead code is manually intensive and can break the application. Traditional tools like IDEs do not provide a complete view of code used in production over time due to their static nature. Profilers are so overhead intensive they cannot practically be used in production settings.<\/p>\n\n\n\n<p>Dead code and &#8220;unreachable code&#8221; both refer to the presence of code within the application or system that don&#8217;t serve any useful purpose. &#8220;Dead code&#8221; is executed but its results are never used anywhere else, while &#8220;unreachable code&#8221; is literally code that is never actually executed during the application&#8217;s run. The two are often considered synonyms despite the (slight) technical difference between them.<\/p>\n\n\n\n\n\n<section    class=\"c-smart-content c-smart-content--color-dark c-smart-content--mt-default c-smart-content--mb-default c-smart-content--pt-default c-smart-content--pb-default c-smart-content--color-1 o-component o-component--color-dark o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_cc48dfbb21a2639fb588a14c0702bc2d\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n\n    \n    <div class=\"c-smart-content__grid c-smart-content__grid--3-cols\">\n        \n<a    class=\"c-smart-content__grid-item o-card o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/wp-content\/uploads\/Code-Inventory-FINAL.pdf\"\n        target=\"_blank\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=b6ac2b4511a229c98dde2e32b942b525 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=3ecc6ff80ba4e7e3a6ab3ec83ba2f15c 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=f06ad6b9a5fdb37b7d680a303fcb7ce9 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=e533a1edbe5bc967cafca13c4a4d6fd9 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=a8822c9d496e4b7a695bbc6114d51440 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=8ad97597f08bb35387e9738e4bae5c27 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=59bcde9503f2fb0a8a9ae13a9285f227 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=311fb944901a364159706f804eb6e545 2x\"\n            >\n            \n    <img alt=\"Code Inventory - Accurately identify dead code for removal to save time and money-min\" class=\"o-picture__image\" height=\"275\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=59bcde9503f2fb0a8a9ae13a9285f227 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=311fb944901a364159706f804eb6e545 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Data Sheets<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Code Inventory\u00ae &#8211; Accurately Identify Unused and Dead Code for Removal to Save Time and Money<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-1 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/blog\/revolutionary-approach-to-java-application-security\/\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=e3717a547047c7dee0fffceb23406cfc 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=ff7e575ae22fa7eec23e501119ea31a4 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=e539e1d96ad8e3ce8ddd5bbfa2d0ee1a 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=f354c1aa5009f47dd011e4827f79eddf 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=448b14e67d4198940ffb1e57ecd32bc6 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=fbb698b1f63a9f9fcefe31304d6c8bd7 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=83072b04336c5298ff8e1af88d320481 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=a9b82fc3eb68c3af75f1ad16868faa7e 2x\"\n            >\n            \n    <img class=\"o-picture__image\" height=\"139\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/11-2-why-avd.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=83072b04336c5298ff8e1af88d320481 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=a9b82fc3eb68c3af75f1ad16868faa7e 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Security<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  A Revolutionary Approach to Java Application Security<\/h3>\n        \n                    <div class=\"o-card__text-subheadline s-wysiwyg o-card__text-subheadline--image\">\n                Scott Sellers \/ 11\u6708 2, 2022            <\/div>\n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-2 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/ebook\/cve-detection-landscape\/\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=179ad9b0a73a6657072ca6aa6da9b23e 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=2052a981b5c9bdec5c12e37fe22b4867 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=c72947727d92dc289514d78313981993 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=7522009b1a20a387e8870df24cac1244 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=d5e0e3228e7ea0774d005edadc9ea184 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=16b9ff448c108ff4392d874a1f4a5ad1 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=e4b4bc210830d847fdeb9af765814cfd 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=35f2dea6f694f8691be3a3c1f9a60908 2x\"\n            >\n            \n    <img alt=\"Assessing the CVE Detection Landscape-min\" class=\"o-picture__image\" height=\"275\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=e4b4bc210830d847fdeb9af765814cfd 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=35f2dea6f694f8691be3a3c1f9a60908 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #DCFEFF; --setting--overline-text-color: #035E5E;\">\n  Research &#038; White Papers<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Assessing the CVE Detection Landscape<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n    <\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"most-common\">What are the most common types of dead code?<\/h2>\n\n\n\n<p>Dead code is executed, so it could generate a result, but that result is never used after being calculated. It could yield a side effect (perhaps generating an exception, creating a file on disk, or modifying the contents of a database) without anyone realizing it, since the result of the execution is never used.<\/p>\n\n\n\n<p>Consider, for example, a method that takes two integers, x and y, and divides x by y before throwing away the result and continuing to do other work. This might seem to be a harmless waste of CPU cycles, but it harbors a class of bugs (what happens when y is 0?) that could change the execution path drastically.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-important\">Why is it important to identify dead code?<\/h2>\n\n\n\n<p>Dead code increases the cognitive burden for developers to understand the code, makes onboarding new developers difficult, and makes it difficult to update libraries and upgrade from one Java version to the next. Dead code impacts overall developer productivity and slows down the velocity of delivering new features. If unaddressed, dead code becomes harder to deprecate and can lead to zombie code that reawakens with unintended consequences.<\/p>\n\n\n\n<p>Any line of code in a system is a line of code that must be tested, debugged, and maintained. If this code serves no useful purpose, then each second spent testing, debugging, and maintaining is a wasted second.<\/p>\n\n\n\n<p>More importantly, when developers are onboarding to a new system, they assume that all the code in the project serves some useful purpose, and thus spend the time and energy required to understand it. If dead code is present in the project, they will be trying to wrap their head around code that is never executed, which means (at best) they are wasting their time and energy, or (at worst) building a false perspective of the code based on incorrect assumptions suggested to them from the presence of the dead code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"responsible\">Who is responsible for eliminating dead code?<\/h2>\n\n\n\n<p>While compilers and runtime environments often take steps to eliminate dead code as part of their optimization effort. However, they often take a conservative approach since they do not have a holistic picture of the entire system by which to make judgements. For example, in both the JVM and CLR environments, the use of Reflection can construct objects and\/or methods by name, which is impossible for any static code analysis to spot. Dynamic language environments (Python, Ruby, and Javascript, to name a few) have an even more difficult time with this, since much of their execution model is based entirely around runtime evaluation.<\/p>\n\n\n\n<p>This leaves the primary responsibility for dead code elimination to the development team, which carries its own share of risks. Time must be allocated for the team to &#8220;chase down&#8221; code which might be dead and examine all possible places where and how it might be invoked before removing it. For safety&#8217;s sake, the team will also very likely want to put some safeguards in place &#8220;just in case&#8221; that code ever does get called. This adds to the work required to refactor the dead code (and leaves more work to be done in a future sprint, when it&#8217;s finally decided to remove the guarding code).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risks\">What risks are involved with eliminating dead code?<\/h2>\n\n\n\n<p>One risk is leaving dead reachable at the end of some unidentified path where it can still be executed. If the code isn&#8217;t present, it could generate an exception, cause the system to crash, the company to crash, and the world to end. After all, because developers are often working with only a portion of the entire system at a time, it is easy to imagine that &#8220;somewhere, out there&#8221; there is code that depends on this class or this function that otherwise seems unused. Coupled with this is the realization that leaving it in &#8220;doesn&#8217;t hurt anything&#8221; but removing it &#8220;could get me fired&#8221; if it turns out that it is, in fact, still used somehow.<\/p>\n\n\n\n<p>A second risk, more common and more difficult to quantify, is that a developer struggles to understand code with dead code in it. Because dead code is really about that code which is executed at runtime, developers could build \u2013 and continuously maintain \u2013 an entire unit test or integration test suite against the dead code without realizing that it never sees use at runtime. This is, at best, a waste of time and energy, and can in some cases lead to bad or suboptimal decision-making around future growth of the code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-azul-helps\">How does Azul help find dead code?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.azul.com\/products\/components\/code-inventory\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azul Code Inventory<\/a>, a feature of Azul Intelligence Cloud, is the only solution that precisely catalogs what code runs in production across all of an enterprise\u2019s Java workloads. It slashes the time and burden of maintaining and testing unused code, significantly improving developer productivity and ultimately saving money.&nbsp;<\/p>\n\n\n\n<p>Code Inventory is a cloud service that uses information inside the Java Virtual Machine (JVM) to provide a comprehensive view of what code runs in production with no performance penalty. It lowers the burden of maintaining and testing unused and dead code.&nbsp;<\/p>\n\n\n\n<p>A majority of software development is spent on maintenance. Maintaining unused and dead code wastes time and budget. Traditional tools like IDEs with static analyzers do not provide a complete view of the code used in production over time due to their static nature. Profilers are so overhead-intensive they cannot practically be used in production settings. Manually-intensive log line insertions provide only a partial view of unused and dead code.&nbsp;<\/p>\n\n\n\n\n\n<section    class=\"c-cta-band c-cta-band--color-light c-cta-band--mt-default c-cta-band--mb-default c-cta-band--pt-default c-cta-band--pb-default c-cta-band--color-1 o-component o-component--color-light o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_a46e598344df752d4c8a6a71089c452f\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n<div class=\"c-cta-band__wrap c-cta-band__wrap--shadow c-cta-band__wrap--bg-white\" id=\"c-cta-band__wrap--block_a46e598344df752d4c8a6a71089c452f\">\n            \n    <span class=\"o-picture o-picture--background o-picture--cover o-picture--no-radius\">\n\n<picture>\n    \n    <img decoding=\"async\" alt=\"avd-banner\" class=\"o-picture__image\" height=\"228\" loading=\"lazy\" src=\"https:\/\/www.azul.com\/wp-content\/uploads\/avd-banner.svg?no_imgix=true\" width=\"1120\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"c-cta-band__content\">\n        <div class=\"c-cta-band__text\" id=\"c-cta-band__text--block_a46e598344df752d4c8a6a71089c452f\">\n                            \n<h2  class=\"c-cta-band__headline o-headline o-headline--h2 s-medium\"\n    >\n  Azul Intelligence Cloud<\/h2>\n            \n                            \n<div  class=\"c-cta-band__description o-description o-description--body s-wysiwyg s-wysiwyg--description\"\n\n  >\n  <p>Boost DevOps Productivity with Actionable Intelligence from Production Java Runtime Data from any JVM.<\/p>\n<\/div>\n                    <\/div>\n\n                    <div class=\"c-cta-band__cta\">\n                \n<a  class=\"c-cta-band__cta-btn o-button o-button--fuchsia-900 o-button--white-solid\"\n\n  data-cta-band-modal-id=\"cta-band-form-modal-block_a46e598344df752d4c8a6a71089c452f\" href='https:\/\/www.azul.com\/products\/intelligence-cloud\/' target=''\n  >\n  \n  \n  <span class=\"o-button__label\">Learn More<\/span>\n\n  \n  <\/a>\n            <\/div>\n        \n            <\/div>\n<\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n<style>\n            #block_a46e598344df752d4c8a6a71089c452f,\n        #block_a46e598344df752d4c8a6a71089c452f input::placeholder {\n            color: light;\n        }\n    <\/style>\n","protected":false},"template":"","class_list":["post-71945","glossary","type-glossary","status-publish","hentry"],"acf":{"header_title":"Dead Code","sidebar_nav_items":[{"link":{"title":"What is Dead Code?","url":"#what-is","target":""}},{"link":{"title":"What are the most common types of dead code?","url":"#most-common","target":""}},{"link":{"title":"Why is it important to identify dead code?","url":"#why-important","target":""}},{"link":{"title":"Who is responsible for eliminating dead code?","url":"#responsible","target":""}},{"link":{"title":"What risks are involved with eliminating dead code?","url":"#risks","target":""}},{"link":{"title":"How does Azul help find dead code?","url":"#how-azul-helps","target":""}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Dead Code? - Azul | Better Java Performance, Superior Java Support<\/title>\n<meta name=\"description\" content=\"Dead code and &quot;unreachable code&quot; both refer to the presence of code within the application or system that don&#039;t serve any useful purpose.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.azul.com\/glossary\/dead-code\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dead Code\" \/>\n<meta property=\"og:description\" content=\"Dead code and &quot;unreachable code&quot; both refer to the presence of code within the application or system that don&#039;t serve any useful purpose.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.azul.com\/glossary\/dead-code\/\" \/>\n<meta property=\"og:site_name\" content=\"Azul | Better Java Performance, Superior Java Support\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AzulSystemsInc\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T16:54:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.azul.com\/wp-content\/uploads\/what-is-dead-code-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@azulsystems\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.azul.com\/glossary\/dead-code\/\",\"url\":\"https:\/\/www.azul.com\/glossary\/dead-code\/\",\"name\":\"What is Dead Code? - Azul | Better Java Performance, Superior Java Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.azul.com\/#website\"},\"datePublished\":\"2024-06-03T16:54:06+00:00\",\"dateModified\":\"2024-06-03T16:54:09+00:00\",\"description\":\"Dead code and \\\"unreachable code\\\" both refer to the presence of code within the application or system that don't serve any useful purpose.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.azul.com\/glossary\/dead-code\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.azul.com\/glossary\/dead-code\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.azul.com\/glossary\/dead-code\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.azul.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/www.azul.com\/glossary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dead Code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.azul.com\/#website\",\"url\":\"https:\/\/www.azul.com\/\",\"name\":\"Azul | Better Java Performance, Superior Java Support\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.azul.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.azul.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.azul.com\/#organization\",\"name\":\"Azul\",\"alternateName\":\"Azul Systems\",\"url\":\"https:\/\/www.azul.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"contentUrl\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"width\":112,\"height\":48,\"caption\":\"Azul\"},\"image\":{\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/AzulSystemsInc\",\"https:\/\/x.com\/azulsystems\",\"https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A\",\"https:\/\/www.linkedin.com\/company\/azul-systems\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Dead Code? - Azul | Better Java Performance, Superior Java Support","description":"Dead code and \"unreachable code\" both refer to the presence of code within the application or system that don't serve any useful purpose.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.azul.com\/glossary\/dead-code\/","og_locale":"ja_JP","og_type":"article","og_title":"Dead Code","og_description":"Dead code and \"unreachable code\" both refer to the presence of code within the application or system that don't serve any useful purpose.","og_url":"https:\/\/www.azul.com\/glossary\/dead-code\/","og_site_name":"Azul | Better Java Performance, Superior Java Support","article_publisher":"https:\/\/www.facebook.com\/AzulSystemsInc","article_modified_time":"2024-06-03T16:54:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.azul.com\/wp-content\/uploads\/what-is-dead-code-min.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@azulsystems","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.azul.com\/glossary\/dead-code\/","url":"https:\/\/www.azul.com\/glossary\/dead-code\/","name":"What is Dead Code? - Azul | Better Java Performance, Superior Java Support","isPartOf":{"@id":"https:\/\/www.azul.com\/#website"},"datePublished":"2024-06-03T16:54:06+00:00","dateModified":"2024-06-03T16:54:09+00:00","description":"Dead code and \"unreachable code\" both refer to the presence of code within the application or system that don't serve any useful purpose.","breadcrumb":{"@id":"https:\/\/www.azul.com\/glossary\/dead-code\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.azul.com\/glossary\/dead-code\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.azul.com\/glossary\/dead-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.azul.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/www.azul.com\/glossary\/"},{"@type":"ListItem","position":3,"name":"Dead Code"}]},{"@type":"WebSite","@id":"https:\/\/www.azul.com\/#website","url":"https:\/\/www.azul.com\/","name":"Azul | Better Java Performance, Superior Java Support","description":"","publisher":{"@id":"https:\/\/www.azul.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.azul.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.azul.com\/#organization","name":"Azul","alternateName":"Azul Systems","url":"https:\/\/www.azul.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","contentUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","width":112,"height":48,"caption":"Azul"},"image":{"@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AzulSystemsInc","https:\/\/x.com\/azulsystems","https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A","https:\/\/www.linkedin.com\/company\/azul-systems"]}]}},"_links":{"self":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary\/71945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/media?parent=71945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}