Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The data strategy governs the process of validating the vendor data, creating, enriching, and validating the golden copy security, and releasing the golden copy security on a field by field basis to the SECURITY database in the Eagle data warehouse.When you create a data strategy, you select the options that control the types of reference data to release, the vendors to use, and the validations to apply for each gold copy composited security. You can define a series of data strategies for each reference data type, such as security, analytics, and so forth; however, you must not set up two data strategies that process the same security for the same reference data type. You can import Eagle default data strategies when you migrate security data strategies.

...

  • Securities managed by the data strategy
  • Field groups and release levels in the data strategy
  • Gold copy sources to release
  • Source hierarchy rules for each field
  • Validation rules for each field
  • Enrichment rules for each field
  • Input values, such as default and override values

Create Data Strategies

You can use In the Setup workspace in Reference Data Center to create a data strategy by specifying information about the data strategy, including the name, general description, securities to process, fields to composite, data sources to use, and the enrichments and validations to apply during the securities compositing process. You can also audit the historical changes to data strategies.

...

  1. From the Setup workspace, click Data Strategies in the left navigation.
    You see the Data Strategy workspace with the list of available data strategies.
  2. Click Create New.
    You see the Data Strategy Definition dialog boxwizard with the Definition page as the default.
  3. In the ID text box, enter a unique identifier. If you leave this option blank, the system assigns a unique identifier.
  4. In the Name text box, enter a name for the data strategy.
  5. In the Description text box, optionally enter a description of the data strategy.
  6. The Data Type field defaults to Price.
  7. The Gold Copy field defaults to the composite source selected during setup.
  8. Click Advanced Options to view the Advanced Options dialog box. Select all that apply and then click Save. Options include: 

    OptionDescription
     Apply trade volume to source rule logic When active, this feature uses the validated source, price type and exchange that has the most volume instead of the highest in the hierarchy
     Month End Processing Only - Bypass WIP Process. This feature bypasses the posting prices to the PRICE_WP table when a price is composited.
     Use underlying Security's price. Don't create demandWhen activated, this assumes that the data strategy is leveraging a price from the underlying enrichment and does not create a demand for the parent holding.
     Create demand for specified effective date This feature creates vendor-level demand for both the submitted effective date and evaluated date rule on the price source hierarchies.
    This data strategy will override other data strategies when there is a conflict in result of the security criteria logic This designates this data strategy as the trumping data strategy in case of conflict.
     Include underlying securities when creating demand. This feature creates demand for any underlying securities when demand is submitted for the data strategy.


  9. Set the Enabled check box (default) to indicate the data strategy is enabled for use. Or, clear the check box to disable use.
  10. Click the Vendor Data Expiration drop down and optionally select a date rule to block stale vendor data from composite use.
  11. Click Next.
    You see the Data Strategies  Criteria page.

Specify the Security Criteria

...

Define Vendor Data Expiration 

In the Vendor Data Expiration page you can define the date rule for all vendor data sources. here you can override the Vendor Date Expiration entered in the Sources page.

  1. For the Vendor Source listed, select the corresponding Date Rule from the drop-down list. Options include: 

Apply Enrichments

...