Chapter 37. Configuring an operating system to optimize memory access