What’s new in Visual Assist 2024.3
News|by Leanne Bevan|7 May 2024
The Visual Assist 2024.3 release from Whole Tomato Software brings a range of enhancements and fixes to improve developer productivity. Here are the highlights:
Performance Improvements
The Find References feature has been optimised for speed and accelerates refactorings involving symbol identification, such as Rename. This improvement makes code navigation smoother and faster.
New Features
- Create File: You can specify a directory when creating a new file, providing better organisation options.
- Move Implementation: This triggers Create File if no suitable target exists, streamlining file management.
- Move Class to New File: This feature has exited beta, providing a more polished experience.
- CUDA Support: This feature has also graduated from beta, enhancing GPU programming support.
Bug Fixes and Refinements
- Issues with Move Implementation not functioning properly when a new file was needed have been resolved.
- C headers mistakenly added instead of their C++ equivalents are now correctly identified.
- Move Class to New File offers proper prompts even around macros.
Quality of Life Improvements
- Enhanced C# editor performance.
- New Discord links and feedback options facilitate community engagement directly from the Help menu.
Buy Visual Assist
You can buy a licence on our webshop or speak to one of our licensing experts – fill in the contact form below.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Leanne Bevan
Related News
How to build a resilient data security strategy
Data is the lifeblood of business. So, it’s constantly at high-risk of being lost or stolen. From ransomware attacks to insider threats, you face mounting pressure to protect sensitive information. This blog explores four pillars of data security – encryption,...
Endpoint security: Protecting your devices from cyber threats
In today’s hybrid work world, your devices – laptops, smartphones, desktops – are more than just tools. They’re gateways to your business. And that makes them prime targets for cyber criminals. Endpoint security is the fifth layer of security (see...
Why Trust is a Vulnerability: The Rise of Zero Trust Security
Thu 13 November 2025 3:00 pm - 4:00 pm GMT
Still relying on traditional network security? It’s time to rethink. Dive into the core principles and benefits of Zero Trust. Join us for this webinar where our Microsoft 365 specialist, Olaitan Almaroof, explores the Zero Trust security model. Discover the...
Securing the application layer: Build smart – stay secure
In today’s digital landscape, the application layer is where innovation meets vulnerability. As you race to deliver smarter, faster, and more scalable solutions, the need to secure applications from the inside out has never been more critical. It’s the layer...