...
The Eagle data warehouse is designed to consolidate information from multiple sources, reconcile discrepancies among vendors, and enrich the data available to clients. It consists of various databases. The security master data is stored in the SECURITY database in various tables and fields. The SECURITY database contains a variety of tables:
- Composite Tables
- History History Tables
- Time Time Series Tables
Anchor | ||||
---|---|---|---|---|
|
The Composite table stores the current version of the security master record, which is typically built by the Reference Data Center. Data stored in the composite table is not identified with a SRC_INTFC_INST or an EFFECTIVE_DATE because the data at this level is the most current data available for source Eagle PACE and is typically used as production data.
The Composite table stores an UPDATE_SOURCE, which identifies the last person or process that modified the record, and an UPDATE_DATE, which specifies when the record was last updated. There is only a single composite record per security. Additional composite records can be built, but the records are stored in the History tables.
Examples of Composite tables include the SECURITY_MASTER table, which stores general security master data, and the EQUITY table, which stores data specific to equity securities. Similar tables also exist to store information for fixed income securities, mortgage backed securities, and other security types. An example of the SECURITY_MASTER table follows.
SECURITY_MASTER Table
Sec Alias | Asset ID | Issue Name | Ticker | Sec Type | Update Source | Update Date |
---|---|---|---|---|---|---|
200 | 123456789 | ABC Incorporated | ABC | CS | Bloom | 11/19 |
...
The History table stores records for each vendor source, as well as for the Eagle PACE gold copy and any other gold copy sources. Each history record is stored with a SRC_INTFC_INST and EFFECTIVE_DATE. A new history record is loaded for each source every time a data element changes from the last history record for the source. Therefore, there are multiple history records per security. Data for the most recent Eagle PACE source history record is identical to the SECURITY_MASTER composite record.
Examples of security History tables include SECMASTER_HISTORY and EQUITY_HIST. Similar tables exist for other security types. An example of the SECMASTER_HISTORY table follows.
SECMASTER_HISTORY Table
Src Intfc Inst | EFFECTIVE DATE | SEC ALIAS | PRIMARY ASSET ID | ISSUE NAME | TICKER | SEC TYPE | UPDATE SOURCE | UPDATE DATE |
---|---|---|---|---|---|---|---|---|
25 | 11/18 | 200 | 123456789 | ABC Incorporated | ABC | CS | Bloom | 11/19 |
23 | 11/18 | 200 | 123456789 | ABC Inc. | ABC | COM | IDC | 11/18 |
25 | 10/30 | 200 | 123456789 | ABC Incorp. | ABC | CS | Bloom | 10/31 |
...
The Time Series table stores date-specific security data, such as prices, analytics, and ratings data. For example, the CUSIP or Currency for a common stock security typically remains the same for as long as the security is issued. However, the price or earnings per share would likely change on a day by day basis.
The Time Series table is not associated with a History table. Each record in the Time Series table is stored with a SECURITY_ALIAS, SRC_INTFC_INST and EFFECTIVE_DATE. A new record is usually added each day, regardless of whether there has been a change in the data.
Examples of Time Series tables include RATINGS, VARIABLE_RATE, SCHEDULE, FX_RATES, and PRICE. An example of the RATINGS table follows.
RATINGS Table
SRC INTFC INST | EFFECTIVE DATE | SEC ALIAS | ALPHA RATING | Update Source | Update Date |
---|---|---|---|---|---|
8 | 11/18 | 200 | Aa3 | Moody | 11/18 |
9 | 11/18 | 200 | AA | S&P | 11/18 |
...
After the vendor security data is loaded into the Eagle data warehouse, the Reference Data Center processes the security history records via the data strategy, which identifies the following:
Fancy Bullets |
---|
|
...
For example, the following diagram shows security reference data received from three different sources: Reuters, Interactive Data, and Bloomberg.
The Reference Data Center interprets the user-defined source hierarchy rules via the data strategy, utilizing the data stored in the History tables. The following table shows an aggregation of the sources defined for each field in the previous diagram.
Data Element | Source |
---|---|
Issue Description | IDC |
Issue Date | Bloomberg |
Currency | Reuters |
Coupon | Reuters |
Maturity Date | Bloomberg |
Principal Amount | Bloomberg |
When the Reference Data Center processes the data strategy, the gold copy security record is defined, as shown in the first column of the following diagram.
The Reference Data Center takes a "best of breed" approach between the data sources to create the gold copy security record.
Anchor | ||||
---|---|---|---|---|
|