We'll have to deal with it forever in network protocols. Thankfully that's rather walled off from most software.
As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.
As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.