About

Stephen Frost is the Chief Technology Officer for Crunchy Data Solutions, Inc.

Stephen is a PostgreSQL Committer and Major Contributor, his previous work has included implementing the role system in 8.1 (replacing the previous user/group system), column-level privileges in 8.4 and improvements to PL/pgSQL.


Stephen Frost has presented the following presentations

    Stephen Frost Bruce Momjian Developer Unconference at CHINA 2020 And PGConf.Asia 2020
    Developer Unconference

    presented by Stephen Frost and Bruce Momjian

    This is a developer unconference.

    Hosted by Bruce Momjian

    Do come if you have interesting Postgres feature ideas

    Tue 17 2020 Everything about Postgres
    Stephen Frost IDENTIFYING SLOW QUERIES AND FIXING THEM! at PGConf US 2017 [PgConf.US]

    presented by Stephen Frost


    video

    We'll be looking at PostgreSQL configuration options (postgresql.conf) for logging and basic tuning parameters, going over EXPLAIN and EXPLAIN ANALYZE output for select queries (and the auto_explain module), what the EXPLAIN output means in terms of how the query is being executed, and then going over ways to improve the queries, including index creation, rewriting the query to allow PG to use ...

    more

    Development
    Stephen Frost Row Level Security at PGConf US 2015 [PgConf.US]

    presented by Stephen Frost

    PostgreSQL has long had a complex and interesting set of permissions available through the GRANT system. There is another system which exists in many other RDBMS's known as row-level security (RLS), where the rows returned is filtered based on a policy implemented on the table. In this talk we'll review RLS, provide examples and use-cases, discuss the work which has been done on adding Row Leve...

    more

    Security
    Stephen Frost Intro to PostgreSQL Security at PGConf NYC 2014 [PgConf.US]

    presented by Stephen Frost

    Review of the PostgreSQL Authorization system, including roles and the GRANT/REVOKE system. We'll also cover various per-role options including the superuser flag and what a superuser can do that normal users can't (and why superuser is particularly dangerous...).

    Security