Understand the Reference Data Center Workspaces
In the Reference Data Center window, the workspace is the area where data is displayed and edited. A workspace has an associated ribbon with action buttons that allow you to view and manage data. The Reference Data Center supports the following top-level workspaces:
Reference Desk. This top-level workspace include the following workspaces to manage reference data:
Securities
Legal Entities
Third Party Cash Flows
Prepayment Time Series
Prices
Setup. This top-level workspace includes the workspaces used to set up fields, data strategies, FINCAD analytics functions, sources, rules, and the system settings that control the behavior of the Reference Data Center.
Monitor. This workspace enables you view the Automation Center of Reference Data Center RDC processes and events.
Running across the top of the Reference Data Center window is the application's title bar, the Eagle navigator button, the center
On this Page:
tabs, and the ribbon. To the left of the window, running vertically, is the left navigation. Running horizontally at the bottom of the window are the bottom navigation tabs and status and notification bar.
In the middle of all these elements is the workspace, which is host to your windows and their options. When you edit a security in the workspace it is automatically checked out. No one else can edit the security at the same time. When you save your changes, the security is automatically checked in. The length of time that a security can be checked out and not updated is maintained using the system settings in the Setup area of the Reference Data Center.
For additional information on managing workspace searches, navigating in Eagle, and using the ribbon, see Getting Started with Eagle V17.
The Ribbon
The workspace ribbon provides you with a set of tools that are organized under two tabs in the Reference Data Center.
The Workspace
The workspace is the main work area in the Reference Data Center where data is displayed or edited. In the workspace, you can review securities, and exceptions, create and delete securities, audit manual changes to securities, attach documents and comments to securities, generate reports, and edit overrides.
The summary information is the top section of the workspace. This pane displays the counts of securities released, the Top 5 Exceptions by count, and the count of exceptions by data strategy. You can query counts by:
Source
As Of Date
Composite Date
The options in the middle section of the Securities workspace allow you to search for securities and exceptions. The following options are always visible:
View Data By. Required. Allows you to search for securities and exceptions.
Process Date. Required. Specifies the process date on which to filter the securities and exceptions displayed in search results. When data is not available for the composite date, no data is displayed. This field is used so you can view, resolve, and release exceptions for any given date. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use As of Date to select your securities.
As of Date. Required. Specifies the as of date on which to filter the securities and exceptions displayed in search results. When data is not available for the as of date, the latest data prior to the as of date is displayed. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use Composite Date to select your securities.
Gold Copy Status. Specifies the overall status of the security based on its Gold Copy level exceptions.
Composite Status. Specifies the status of the composite on which to filter the securities and exceptions displayed in search results. Options include any combination of Critical Exceptions, No Exceptions, and Warning Exceptions.
The middle section of the Securities workspace displays the securities that have gone through compositing and validation. These securities may include securities that require further review or have one or more exceptions that need to be resolved before being released to the Eagle data warehouse. Options include:
Exception Status. Specifies the severity of exceptions historically detected for the security. You can hover over the field to view the count of composite errors, warning messages, and vendor errors for the security. Options include:
– Green Circle (No exceptions) Indicates that no errors were detected.
– Yellow triangle (Warning). Indicates that there is one error of severity level Warning, but no other critical errors.
– Red square (Critical Error). Indicates at least one error preventing a field from being released.
– Clock Icon (Authorizations Pending ). Indicates at least one override requiring authorization, but no other critical errors.Release Level. Specifies the status of the security. You can release field level changes to the Eagle data warehouse on a field by field basis, allowing you to process transactions more quickly, or as a set within a field group, as determined by the data strategy. Field level changes can be released independently to process transactions more quickly, recognizing the different amounts of data required to trade versus settle a position in the back office versus calculate performance or produce client reports.Options include:
– Not Released (Level 0). Indicates the security has one or more exceptions.
– Released for Trading (Level 1). Indicates the security has passed all Level 1 edit checks.
– Released for Trading and Back Office (Level 2). Indicates the security has passed all Level 1 and Level 2 edit checks.
– Released with No Exceptions (Level 3). Indicates the security has passed all Level 1, Level 2, and Level 3 edit checks and is eligible for use by downstream systems.Effective Date. Specifies the most recent effective date for the security.
Issue Name. Specifies the issue name of the security.
Primary Asset ID. Specifies the primary asset identifier of the security.
Data Strategy. Specifies the data strategy that governs the security.
Investment Type. Specifies the investment of the security.
Currency. Specifies the currency for the security.
Exchange. Specifies the exchange for the security.
Needs Authorization. Specifies whether the security needs authorization to release.
The bottom section of the Securities workspace displays the different exceptions associated with the selected security, tabbed by Data Type. In the title bar, you can view the count of exception records that follow. You can drill down on a specific exception record for better identification of the problem. Options include:
Field. Displays the name of the composite field in error.
Source. Displays the vendor source of the field in error.
Error Code. Displays the error code of the validation error.
Status. Displays the status of the error.
Severity. Displays the severity level of the exception. Options include:
– Warning
– CriticalError. Describes the validation error.
Resolution. Explains how to resolve the error.
Business Description. Describes what caused the error.
The Edit Security Window
When you drill down on a specific security or exception record, the Reference Data Center displays the Edit Security window with the Security Details tab selected. Options include:
Security Details tab. Provides information for each failed exception:
– Field. Displays the name of the field with the exception.
– Source. Displays the vendor source of the data.
– Error Code. Displays the error code.
– Status. Indicates whether the exception is an error or warning.
– Severity. Indicates whether the exception is a warning or critical.
– Validation. Displays the name of the validation rule.
– Error. Describes the validation error.
– Reason. Describes what caused the error.
– Resolution. Explains how to resolve the error.
– Last Updated By. Identifies who made the last update.
– Last Updated. Provides a date and timestamp.
Clicking on an exception record brings you directly to the field with the exception in the Details tab. The Details tab displays the security master details based on the fields selected in the data strategy for the given security. Options include:
– Field Name. Displays the name of the field. The system indicates whether there is an override (blue arrow), a failed gold copy field (red square) or failed vendor field (yellow triangle), and the release level (1 - Released for Trading, 2 - Released for Trading and Back Office, or 3 - Released with No Exceptions) to the left of the field name.
– Current Day Gold Copy. Displays the value of the current day's gold copy security.
– 1st Vendor. Displays the value received from the first vendor. The name of the column displays the vendor source and date received.
– 2nd Vendor. Displays the second, third, and so forth vendors, as specified by the data strategy.
Other tabs available from the Edit Security workspace include:
Analytics tab. Displays security analytics based on the Analytics data strategy governing the security.
Variable Rates tab. Displays variable rates based on the Variable Rates data strategy governing the security.
Ratings tab. Displays security ratings based on the Ratings data strategy governing the security.
Vendor History tab. Displays vendor history based on the Vendor History data strategy governing the security.
Corporate Actions tab. Displays corporate actions if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
Final Factor tab. Displays factors if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
Schedules tab. Displays call and put schedules if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
SMF Earnings Time Period tab. Displays earnings time periods for scheduled changes to a security. Note you can view this information, however, it is not part of the full Reference Data Center workflow
The Monitor Workspace
The Monitor workspace displays the Automation Center workspace, allowing you to monitor Event Type equal to Reference Data Center events. You can monitor jobs/events status for any job you wish to select. The information displays below the results in several panes:
Jobs/Events Status pane. This area lists all the jobs/events for the Reference Data Center event type.
List/Dependencies/SLA pane. This pane displays the data strategies processed for the job/event selection above.
Exceptions pane. This area displays the exception details for a data strategy selection above.