Inotify was a replacement for dnotify. Which was there since 2.4. http://en.wikipedia.org/wiki/Dnotify
Also comparing the two subsystems is entirely wrong. ReadDirectoryChangesW is still a polling mechanism, inotify and dnotify are kernel level events.
>Amusingly, this just displays your own naivete. The only way to get security if someone has physical access is through cryptography. Pressing cancel on a local login screen is equivalent to booting into single user mode or just using a boot disk and wiping out the local administrator's password.
You're just being an obstinate child here. There's a difference when anyone can defeat your security, and when knowledgeable people can defeat your security. Why do company's take people of the premises when they're fired? Because it's easier for them to lash out, and cause damage. Well it's certainly easier for a passerby to break into your system by pressing cancel. Outside physical threats are always there, especially in the form of delivery men. What's the point of even password protecting something when the UPS guy can come and hit cancel cause he has 95 at home? Not only that but you still need a password for single user mode, and it would take a bit longer for him if he had a boot disk.
>Microsoft Research is the most prolific non-university academic CS research lab in the world. The people that work there are all truly brilliant. (disclosure: I did an internship there this summer)
This isn't about Microsoft Research, this is about Microsoft products. This is a completely irrelevant point. MSR is a fine institution which is a great place for academic papers, they don't generally develop products for Microsoft.
Don't talk shit about stuff you know nothing about.
> Also comparing the two subsystems is entirely wrong. ReadDirectoryChangesW is still a polling mechanism, inotify and dnotify are kernel level events.
ReadDirectoryChangesW sleeps while there aren't any changes and only returns once there are some changes. Efficiency-wise there isn't any real difference between kernel-level events and sleeping on a different thread, and I don't see one as clearly better than the other. After all, waking a thread up is also a kernel-level event!
> Not only that but you still need a password for single user mode, and it would take a bit longer for him if he had a boot disk.
Who cares? The difference in the level of security you get is a small epsilon. You either don't care about physical attacks, in which case you don't care whether it takes 5 seconds or 5 minutes to break, or you do care about physical attacks, in which case you encrypt your data.
Of course, your entire point is irrelevant -- calling Windows 9x "on the top of it's [sic] game" in terms of security is lying. Windows 9x was insecure in much more serious ways than a stupid login prompt. Windows NT-based systems, especially Vista onwards, are much more effectively designed.
> This isn't about Microsoft Research, this is about Microsoft products. This is a completely irrelevant point.
You used the words "success" and "innovation". The fact that MSR exists and is as good as it is, is an important part of Microsoft's success as a whole, and there's no lack of innovation on display there (witness Street Slide for a recent example). To consider "success" and "innovation" only in terms of released products is myopic.