Gooood Morning,
Is anyone on the list familiar with implementing these two methods of connecting to SQL server via ASP.Net in the real world? I'm trying to understand better a vague reference in the MSDN docs to "large numbers of users". i.e. The docs state that one of the disadvantages to Impersonation is that it "significantly limits the application's ability to scale to large numbers of users". I understand what the limitation is, connection pooling, but I don't know the scale. I'd really like to know what 'large numbers of users' means - 100? 10,000? 1,000,000? All could be 'large numbers of users' in different contexts. Our developers are asking us which method we would like them to use for some new projects they are about to start working on. Don't get me started on why the developers we hired have no experience in this arena. All that I'll say is, we get what we pay for around here. -Jim Jim Holmgren Manager of Server Engineering XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the member of as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso exclusivo del destinatario(s) y puede contener información confidencial y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el destinatario tiene la obligación de mantener esta información segura y confidencial. Cualquier divulgación a terceros sin la autorización de los miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto con el remitente por teléfono y destruir todas las copias del mensaje original ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
