Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Reference Desk. This top-level workspace includes a Securities workspace to manage reference data and a Monitor workspace to view the Automation Center monitoring of Reference Data Center RDC processes and events.
  • Setup. This top-level workspace includes the workspaces used to set up fields, data strategies, FINCAD analytics functions, sources, rules, and the system settings that control the behavior of the Reference Data Center. 

...

When working in the Reference Data Center, keep in mind that your system administrator manages how you work by assigning permissions in the User Administration area of the System Management Center.

The role based user interface provides strict access control based on the employee's role:

...

The ribbon for the Data wunderbar allows you to perform actions on the data in the Reference Data Center. The ribbon choices depend on what you are doing. By switching tabs, you change your ribbon choices. 

 

Expand
titleHome tab
  • Create New. Creates a new security or data strategy.
  • Edit. Edits security detail information, such as corporate actions, factors, call / put schedules, and third party cash flows.
  • Delete. Deletes a security.
  • View. Displays security detail information, such as corporate actions, factors, call / put schedules, and vendor cash flows for a security.
  • Authorize. Authorizes an override to an exception.
  • Release Exception. Releases an exception.
  • Attach/Comment. Attaches comments and documents to securities and exceptions.
  • Audit. Displays a list of manual changes made to securities and exceptions.
  • Data Overrides. Displays a list of all manual changes associated with one or more securities and allows you to modify the changes.
  • Released Exceptions. Allows you to list and edit released exceptions.
  • Reports. Generates reports that you can print and export. -
  • MicroStrategy Reports. Generates MicroStrategy reports that you can print and export.
  • Submit. Allows you to submit a data strategy or securities data type for processing.
  • Check for Conflicts. Lists data strategies with overlapping securities. You must be in the Data Strategies workspace to view this option.
  • Export. Exports the data displayed in the workspace to an Excel or CSV file.
  • Print. Prints the data displayed in the workspace.
  • Copy. Allows you to select an item in the workspace and copy it to the clipboard.
  • Cut. Allows you to remove a selected item from the workspace.
  • Paste. Allows you to paste an item you copied into the workspace.
  • Search. Allows you to view recent securities searches and save search criteria for reuse.
  • Find. Allows you to quickly find data in the workspace.
  • Refresh Screen. Refreshes the results in the workspace.

...

The Securities Workspace
Anchor
user_guide_rdc_workspace_htm_sec_1113
user_guide_rdc_workspace_htm_sec_1113

...

The Securities workspace is the main work area in the Reference Data Center where data is displayed or edited. In the Securities workspace, you can review securities and exceptions, create and delete securities, audit manual changes to securities, attach documents and comments to securities, generate reports, and edit overrides.

The summary information is the top section of the Securities workspace. This pane displays the counts of securities released, the Top 5 Exceptions by count, and the count of exceptions by data strategy. You can query counts by:

...

  • View By. Required. Allows you to search for securities and exceptions.
  • Composite Date. Required. Specifies the composite date on which to filter the securities and exceptions displayed in search results. When data is not available for the composite date, no data is displayed. This field is used so you can view, resolve, and release exceptions for any given date. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use As of Date to select your securities.
  • As of Date. Required. Specifies the as of date on which to filter the securities and exceptions displayed in search results. When data is not available for the as of date, the latest data prior to the as of date is displayed. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use Composite Date to select your securities.
  • Gold Copy. Required. Specifies the gold copy source name for the security reference data.
  • Composite Status. Specifies the status of the composite on which to filter the securities and exceptions displayed in search results. Options include any combination of Critical Exceptions, No Exceptions, and Warning Exceptions. 

The middle section of the Securities workspace displays the securities that have gone through compositing and validation. These securities may include securities that require further review or have one or more exceptions that need to be resolved before being released to the Eagle data warehouse. Options include:

  • Exception Status. Specifies the severity of exceptions historically detected for the security. You can hover over the field to view the count of composite errors, warning messages, and vendor errors for the security. Options include:
    –  Green icon. Indicates that no errors were detected.
    –  Orange icon. Indicates only warning and vendor errors were detected for the security.
    –  Red icon. Indicates one or more composite errors were detected.
    Anchor
    user_guide_rdc_workspace_htm_rel_1680
    user_guide_rdc_workspace_htm_rel_1680
  • Release Level. Specifies the status of the security. You can release field level changes to the Eagle data warehouse on a field by field basis, allowing you to process transactions more quickly, or as a set within a field group, as determined by the data strategy. Field level changes can be released independently to process transactions more quickly, recognizing the different amounts of data required to trade versus settle a position in the back office versus calculate performance or produce client reports.Options include:
    –  Not Released (Level 0). Indicates the security has one or more exceptions.
    –  Released for Trading (Level 1). Indicates the security has passed all Level 1 edit checks.
    –  Released for Trading and Back Office (Level 2). Indicates the security has passed all Level 1 and Level 2 edit checks.
    –  Released with No Exceptions (Level 3). Indicates the security has passed all Level 1, Level 2, and Level 3 edit checks and is eligible for use by downstream systems.
  • Effective Date. Specifies the most recent effective date for the security.
  • Issue Name. Specifies the issue name of the security.
  • Primary Asset ID. Specifies the primary asset identifier of the security.
  • Data Strategy. Specifies the data strategy that governs the security.
  • Investment Type. Specifies the investment of the security.
  • Currency. Specifies the currency for the security.
  • Exchange. Specifies the exchange for the security.
  • NeedsAuthorization. Specifies whether the security needs authorization to release.

...

  • Security Details tab. Provides information for each failed exception:
    –  Field. Displays the name of the field with the exception.
    –  Source. Displays the vendor source of the data.
    –  Error Code. Displays the error code.
    –  Status. Indicates whether the exception is an error or warning.
    –  Severity. Indicates whether the exception is a warning or critical.
    –  Validation. Displays the name of the validation rule.
    –  Error. Describes the validation error.
    –  Reason. Describes what caused the error.
    –  Resolution. Explains how to resolve the error.
    –  Last Updated By. Identifies who made the last update.
    –  Last Updated. Provides a date and timestamp.
    Clicking on an exception record brings you directly to the field with the exception in the Details tab. The Details tab displays the security master details based on the fields selected in the data strategy for the given security. Options include:
    –  Field Name. Displays the name of the field. The system indicates whether there is an override (blue arrow), a failed gold copy field (red square) or failed vendor field (yellow triangle), and the release level (1 - Released for Trading, 2 - Released for Trading and Back Office, or 3 - Released with No Exceptions) to the left of the field name.
    –  Current Day Gold Copy. Displays the value of the current day's gold copy security. 
    –  1st Vendor. Displays the value received from the first vendor. The name of the column displays the vendor source and date received.
    –  2nd Vendor. Displays the second, third, and so forth vendors, as specified by the data strategy.
  • Analytics tab. Displays security analytics based on the Analytics data strategy governing the security.
  • Variable Rates tab. Displays variable rates based on the Variable Rates data strategy governing the security.
  • Ratings tab. Displays security ratings based on the Ratings data strategy governing the security.
  • Vendor History tab. Displays vendor history based on the Vendor History data strategy governing the security.
  • Corporate Actions tab. Displays corporate actions if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
  • Final Factor tab. Displays factors if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
  • Schedules tab. Displays call and put schedules if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
  • Third Party Cash Flows tab. Displays third party cash flows if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.

...

Anchor

...

monitoring
monitoring
The Monitor Workspace

The Monitor workspace displays the Automation Center workspace, allowing you to monitor Event Type equal to Reference Data Center events. You can monitor jobs/events status for any job you wish to select. The information displays below the results in several panes:

  •  Jobs/Events Status pane. This area lists all the jobs/events for the Reference Data Center event type.
  •  List/Dependencies/SLA pane. This pane displays the data strategies processed for the job/event selection above.
  •  Exceptions pane. This area displays the exception details for a data strategy selection above.

...