Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 33 Next »

About Data Strategies

The data strategy governs the process of validating the vendor data, creating, enriching, and validating the golden copy security, and releasing the golden copy security on a field by field basis to the SECURITY database in the Eagle data warehouse.

When you create a data strategy, you select the options that control the types of reference data to release, the vendors to use, and the validations to apply for each gold copy composited security. You can define a series of data strategies for each reference data type, such as security, analytics, and so forth; however, you must not set up two data strategies that process the same security for the same reference data type. You can import Eagle default data strategies when you migrate security data strategies.

Each data strategy identifies the following:

  • Securities managed by the data strategy
  • Field groups and release levels in the data strategy
  • Gold copy sources to release
  • Source hierarchy rules for each field
  • Validation rules for each field
  • Enrichment rules for each field
  • Input values, such as default and override values



  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.