How Zero‑Copy Data Access Works (and Why It Matters)