-10 for modules is fair, only 4 for lambdas is not. My programming style changed after using lambdas in Java, even when using a different programming language later that doesn't have lambdas as such.
Substitute orangutans for Australopithecus. That is (one of) the branches that did evolve more intelligence, but didn't survive. I suppose there were lots of such branches, that either merged back into humanity (like the Neanderthals), or died out.
Australopithecus is essentially on the human branch, and likely was still several million years before the development of advanced intelligence. Our common ancestor with Australopithecus was not any more intelligent than a typical Australopithecus, as far as we can tell.
As far as we can tell, no branch developed significantly increased intelligence after splitting off from our own lineage. That's not to say it definitely didn't happen or that our lineage was always the smartest, just that there isn't any evidence demonstrating a qualitative difference which has survived to the present. But it's weird that no such evidence exists.
Conversely different primate groups did independently evolve similar levels of intelligence, like Capuchin monkeys (which are new world primates) developed their intelligence after splitting off from the old world primates some 40 million years ago. Baboons and Macaques likewise each evolved intelligence independent of the great apes. Likewise similar levels (if different specializations) of intelligence have evolved independently outside the primates, such as cetaceans, elephants, and corvids. For cephalopods, which likewise are highly intelligent, their common ancestor with us didn't even have a brain.
To be fair, it is almost impossible to get data out of SAP. Their "security" is all there to prevent users from doing anything useful. You have no access to the underlying database (like DB/2, oracle), you have to use their GUI or write a custom ABAP program.
But in most cases, the functions you need to call to write data to disk are usually closed off to developers due to "security". If you have access to the database (almost impossible to get), the data for the important tables are spread throughout multiple tables with names that look like names created from /dev/urandom.
I am familiar with SAP, all that you say is only true if you don't know how to do it. I see this a lot, people that are familiar with "normal" technology, try to invent ways to do things in SAP. What is wrong with writing an ABAP program, or using a provided communication/interfacing method to transfer data? If you are stuck on GUI/files/DB level, sure you wont be able to do anything. You can for example generate complete excel files on the server, no need for the GUI. There is a running joke on SAP forums about how many times excel file generation was invented.
Some of the cryptic table names date back to R/2, sure, but they are the de-facto standard data model for those business data. If you have business systems communicating, for example product, business partner or financial data, it will have a mark on it of how those data are handled by SAP.
But then there are CDS views (for some time now) that have long descriptive names, and metadata to help you make database queries. You are not meant to read or write database tables directly (as of some time).
Again, I will say, where I worked, due to "security" lots of items were disabled, even for developers. The only item that you could use to get data was SE17, some people (a few) were allowed to have SE16. But due to memory, getting data that way was very slow.
Also, SE16 did and may still have security issues. That was the reason for it being disabled for 99% of the users.
Who does even run Netweaver Java AS today? Apparently some do, but that was a bad idea from the start. It is an optional server component letting Java applications run in the SAP server. In my eyes it was always an unnecessary additional source of complexity, they added it to the portfolio back when Java was the hype. Now its been pwned by an unchecked upload.
But i know that HN does not have an appreciation for SAP anyhow.
I think the success is completely logical, in hindsight, when you consider that the majority of the crypto traffic is bots (to hide the traceability, money laundering, scams), or linked to plain real-world illegal activity.
I think what is relevant here, is that there is a separation between the inside and the outside of the black hole. Since there is no communication between the two, on the inside it could be anything. And its not just the matter and space, even the laws of physics might be completely different. If it weren't so, then there had to be a "super-space" that communicates how ordinary space behaves on both the outside and the inside the black hole.
Mobile phone App/Passkey authentication is just a way to pass the responsibility down to users. Losing a phone today is not just losing the passkey, there are "login with QR-code" schemes too, which do not need a password at all. It is a bad trend to pass all security onto the physical phone.
reply