Thanks. I know Rob Scott knows what he's talking about, and I've been through this material before. I think the aside on not using subpool 0 needs some more explanation. But it's not really directly relevant to the topic of the presentation, which is providing authorized services safely.
For the simplest case, if your program decided to use say, SP 33 for all its private storage you'd get the benefit of having it somewhat isolated from what other programs are doing. There are plenty of more complex scenarios. In any case, it is a recommendation; and on the scale of importance, about 1/10,000th of avoiding, minimizing, and thoroughly testing key 0 code. sas On Thu, Jul 11, 2024 at 7:25 PM Janko Kalinic <[email protected]> wrote: > https://conferences.gse.org.uk/2019/presentations/FN.pdf > > >
