. . "The biggest problem with this approach is that you are penalizing every program in your subsystem for fear that a program or two may have a degraded access path." . .