Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Reference Data Center allows you to composite, validate, and cleanse security reference data from external vendors and internal sources, creating one or more "gold copies" that downstream systems can leverage.
There are multiple validation checks throughout the workflow. For example, the system can optionally validate the vendor data, the enrichments to the gold copy security, and the gold copy security information. You can also perform validations when you create a new security in the Reference Data Center UI.
The workflow consists of the following steps: 1.    Load

  1.  Load the security reference data

...

  1.  Validate the vendor data (optional)

...

  1.  Create the gold copy security record

...

  1.  Enrich the gold copy security record (optional)

...

  1.  Validate the gold copy security record (optional)

...

  1.  Resolve the exceptions

...

  1.  Release the gold copy security record

...

  1.  Distribute the gold copy security record

A description of each step in the workflow follows.

...

The security reference data is loaded from external vendors and internal systems into the SECURITY database tables in the Eagle data warehouse, creating a centralized data repository. This includes the following data:       Securities

  •  Securities

...

  •  Analytics

...

  •  Ratings

...

  •  Variables rates

...

  •  Prepayment time series

...

  •  Underlying securities

...

  •  Vendor History (view only)


 
You can also load, view, and edit the following related security detail information, without compositing, validation, and enrichment:       Corporate

  • Corporate actions

...

  • Call and Put schedules

...

  • Factors

...

  • Third Party cash flows

Anchor
_Toc422746860
_Toc422746860
Validate the Vendor Data

...