<
Back to topic
Example—how VVR uses the checkpoint