Our solution was the following: at startup, we requested the buffer initially, found the locations for each metric for that particular OS configuration, and rewrote the instructions to acces each in a DBank (data banks were modifiable; IBanks — instruction banks — we're not). When we were done, we deleted the old IBank, changed the DBank to mark it as an IBank, and the rest was history.
Extremely efficient. Our competitor's performance could come close. Looking back, and if we had wanted to be malicious, we could have done whatever we wanted, as the privileges to obtain those metrics already meant we had access to anything.
This was 30 years ago. Nothing new under the sun.
Kids today think they are doing things for the first time. Heh.
Couldn’t come close, that should read...