The Reference Data Center is part of Eagle's Data Management solution, a data-centric processing model designed to build and maintain enhanced data in the Eagle data warehouse using various applications and centers, some of which include the following:
Data Mart. A data repository within the Eagle data warehouse and other databases that allows you to organize information for a specific business purpose and distribute it to support specific business needs.
Eagle Analytics. A specialized component that provides built-in functionality for the valuation and calculation of analytics for fixed income and derivative securities, under a licensing agreement for the FINCAD® Analytics Suite.
Pricing Center. An application that allows you to manage the daily pricing process for best-of-breed security prices and foreign exchange (FX) rates.
Metadata Center. A data governance tool that assists you with organizing, managing, and monitoring metadata, data about data.
Eagle Enrichment. A specialized component that uses an original source of accounting data as a baseline to create a modified set of data warehouse data for an entity under a unique source.
About the Security Database
The Eagle data warehouse is designed to consolidate information from multiple sources, reconcile discrepancies among vendors, and enrich the data available to clients. It consists of various databases. The security master data is stored in the SECURITY database in various tables and fields. The SECURITY database contains a variety of tables:
Composite Tables
History Tables
Time Series Tables
Anchor | ||||
---|---|---|---|---|
|
...
Examples of Composite tables include the SECURITY_MASTER table, which stores general security master data, and the EQUITY table, which stores data specific to equity securities. Similar tables also exist to store information for fixed income securities, mortgage backed securities, and other security types. An example of the SECURITY_MASTER table follows.
SECURITY_MASTER Table
Sec Alias | Asset ID | Issue Name | Ticker | Sec Type | Update Source | Update Date |
---|---|---|---|---|---|---|
200 | 123456789 | ABC Incorporated | ABC | CS | Bloom | 11/19 |
Anchor | ||||
---|---|---|---|---|
|
...
Examples of security History tables include SECMASTER_HISTORY and EQUITY_HIST. Similar tables exist for other security types. An example of the SECMASTER_HISTORY table follows.
SECMASTER_HISTORY Table
Src Intfc Inst | EFFECTIVE DATE | SEC ALIAS | PRIMARY ASSET ID | ISSUE NAME | TICKER | SEC TYPE | UPDATE SOURCE | UPDATE DATE |
---|---|---|---|---|---|---|---|---|
25 | 11/18 | 200 | 123456789 | ABC Incorporated | ABC | CS | Bloom | 11/19 |
23 | 11/18 | 200 | 123456789 | ABC Inc. | ABC | COM | IDC | 11/18 |
25 | 10/30 | 200 | 123456789 | ABC Incorp. | ABC | CS | Bloom | 10/31 |
Anchor | ||||
---|---|---|---|---|
|
...
Examples of Time Series tables include RATINGS, VARIABLE_RATE, SCHEDULE, FX_RATES, and PRICE. An example of the RATINGS table follows.
RATINGS Table
SRC INTFC INST | EFFECTIVE DATE | SEC ALIAS | ALPHA RATING | Update Source | Update Date |
---|---|---|---|---|---|
8 | 11/18 | 200 | Aa3 | Moody | 11/18 |
9 | 11/18 | 200 | AA | S&P | 11/18 |
Anchor | ||||
---|---|---|---|---|
|
After the vendor security data is loaded into the Eagle data warehouse, the Reference Data Center processes the security history records via the data strategy, which identifies the following:
Fancy Bullets |
---|
|
For example, the following diagram shows security reference data received from three different sources: Reuters, Interactive Data, and Bloomberg.
The Reference Data Center interprets the user-defined source hierarchy rules via the data strategy, utilizing the data stored in the History tables. The following table shows an aggregation of the sources defined for each field in the previous diagram.
Data Element | Source |
---|---|
Issue Description | IDC |
Issue Date | Bloomberg |
Currency | Reuters |
Coupon | Reuters |
Maturity Date | Bloomberg |
Principal Amount | Bloomberg |
When the Reference Data Center processes the data strategy, the gold copy security record is defined, as shown in the first column of the following diagram.
The Reference Data Center takes a "best of breed" approach between the data sources to create the gold copy security record.
Anchor | ||||
---|---|---|---|---|
|