Once Again, the MVP Friday Five: April 13, 2012.

We're highlighting some great posts we've seen that our MVP Awardees write over the past few weeks.  This
week concentrates on Windows Azure, Visual C#, ASP.NET and SQL Server!

 

1. Exceeding the SLA-It's About Resilience

By Windows Azure MVP Brent Stineman | @brentcodemonkey

Brent walks through fundamentals of SLAs after finding a lack of proper architect solutions which take
advantage of cloud computing.

 

2. Passing Parameters to SQL Server

By Visual C# MVP David Giard | @davidgiard

SQL Injection  is one of the most frequently-exploited vulnerabilities in the software world. It refers to
user-entered data making its way into commands sent to back-end systems. It is common because so
many developers are unaware of the risk and how to mitigate it.

 

3. DocShare: Illustrating the CQRS Pattern with Windows Azure and MVC4 Web API

By Windows Azure MVP David Pallmann | @davidpallmann

The Command-Query Responsibility Separation pattern (CQRS) is a recent pattern that is gaining
popularity. In this post David briefly explains the CQRS pattern and shows an example of it in a Windows
Azure solution that also uses MVC4 & ASP.NET Web API.

4. Using Log Parser to List All Blocked IP Requests

By ASP.NET/IIS MVP Scott Mitchell | @scottonwriting

IIS makes blocking a series of IP addresses easy with its IPv4 Address and Domain Restrictions feature. 
This lets the webmaster specify specific or ranges of IP addresses that are either allowed or denied
access to the website.  Scott shows us how.

5. Analytic Functions – They’re Not Aggregates

By SQL Server MVP Rob Farley | @rob_farley

SQL 2012 brings us a bunch of new analytic functions, together with enhancements to the OVER clause.
Rob is a big fan of the OVER clause and the types of things that it brings us when applied to aggregate
functions, as well as the ranking functions that it enables.  This post is going to look at a particular aspect
of the analytic functions though (not the enhancements to the OVER clause).