About the Reference Data Center Workspace
In the Reference Data Center window, the workspace is the area where data is displayed and edited. A workspace has an associated ribbon with action buttons that allow you to view and manage data. The Reference Data Center supports the following top-level workspaces:
- Reference Desk. This top-level workspace includes a Securities workspace to manage reference data and a Monitor workspace to view the Automation Center monitoring of Reference Data Center RDC processes and events.
- Setup. This top-level workspace includes the workspaces used to set up fields, data strategies, FINCAD analytics functions, sources, rules, and the system settings that control the behavior of the Reference Data Center.Â
Running across the top of the Reference Data Center window is the application's title bar, the Eagle navigator button, the center tabs, and the ribbon. To the left of the window, running vertically, is the left navigation. Running horizontally at the bottom of the window are the wunderbars, bottom navigation tabs, and status and notification bar.
In the middle of all these elements is the workspace, which is host to your windows and their options. When you edit a security in the workspace it is automatically checked out. No one else can edit the security at the same time. When you save your changes, the security is automatically checked in. The length of time that a security can be checked out and not updated is maintained using the system settings in the Setup area of the Reference Data Center.
Role Based Interface
When working in the Reference Data Center, keep in mind that your system administrator manages how you work by assigning permissions in the User Administration area of the System Management Center.
The role based user interface provides strict access control based on the employee's role:
- Â RDC Admin Role. Provides full permissions for the Setup and Data areas of the Reference Data Center.
- Â RDC Analyst Role. Provides analyst specific permissions for the Setup and Data areas of the Reference Data Center and restricts maintenance of information and security detail authorization.
- Â RDC End User Role. Provides view-only permissions for the Setup and Data areas of the Reference Data Center and restricts security data manipulation.
- Â RDC Manager Role. Provides nearly full permissions for the Setup and Data areas of the Reference Data Center and restricts the maintenance of system settings.Â
The Ribbon
The ribbon for the Data wunderbar allows you to perform actions on the data in the Reference Data Center. The ribbon choices depend on what you are doing. By switching tabs, you change your ribbon choices.Â
The Securities Workspace
The Securities workspace is the main work area in the Reference Data Center where data is displayed or edited. In the Securities workspace, you can review securities and exceptions, create and delete securities, audit manual changes to securities, attach documents and comments to securities, generate reports, and edit overrides.
The summary information is the top section of the Securities workspace. This pane displays the counts of securities released, the Top 5 Exceptions by count, and the count of exceptions by data strategy. You can query counts by:
- Â Source
- Â As Of Date
- Â Composite Date
The options in the middle section of the Securities workspace allow you to search for securities and exceptions. The following options are always visible:
- View By. Required. Allows you to search for securities and exceptions.
- Composite Date. Required. Specifies the composite date on which to filter the securities and exceptions displayed in search results. When data is not available for the composite date, no data is displayed. This field is used so you can view, resolve, and release exceptions for any given date. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use As of Date to select your securities.
- As of Date. Required. Specifies the as of date on which to filter the securities and exceptions displayed in search results. When data is not available for the as of date, the latest data prior to the as of date is displayed. If you resolve exceptions for the most recent build record, the system updates both the Composite and the History tables. For all other dates, the system updates only the History tables. The most recent build record is decided at the security level. This field is not available when you use Composite Date to select your securities.
- Gold Copy. Required. Specifies the gold copy source name for the security reference data.
- Composite Status. Specifies the status of the composite on which to filter the securities and exceptions displayed in search results. Options include any combination of Critical Exceptions, No Exceptions, and Warning Exceptions.Â
The middle section of the Securities workspace displays the securities that have gone through compositing and validation. These securities may include securities that require further review or have one or more exceptions that need to be resolved before being released to the Eagle data warehouse. Options include:
- Exception Status. Specifies the severity of exceptions historically detected for the security. You can hover over the field to view the count of composite errors, warning messages, and vendor errors for the security. Options include:
–  Green icon. Indicates that no errors were detected.
–  Orange icon. Indicates only warning and vendor errors were detected for the security.
– Red icon. Indicates one or more composite errors were detected. - Release Level. Specifies the status of the security. You can release field level changes to the Eagle data warehouse on a field by field basis, allowing you to process transactions more quickly, or as a set within a field group, as determined by the data strategy. Field level changes can be released independently to process transactions more quickly, recognizing the different amounts of data required to trade versus settle a position in the back office versus calculate performance or produce client reports.Options include:
–  Not Released (Level 0). Indicates the security has one or more exceptions.
–  Released for Trading (Level 1). Indicates the security has passed all Level 1 edit checks.
–  Released for Trading and Back Office (Level 2). Indicates the security has passed all Level 1 and Level 2 edit checks.
–  Released with No Exceptions (Level 3). Indicates the security has passed all Level 1, Level 2, and Level 3 edit checks and is eligible for use by downstream systems. - Effective Date. Specifies the most recent effective date for the security.
- Issue Name. Specifies the issue name of the security.
- Primary Asset ID. Specifies the primary asset identifier of the security.
- Data Strategy. Specifies the data strategy that governs the security.
- Investment Type. Specifies the investment of the security.
- Currency. Specifies the currency for the security.
- Exchange. Specifies the exchange for the security.
- NeedsAuthorization. Specifies whether the security needs authorization to release.
The bottom section of the Securities workspace displays the different exceptions associated with the selected security. In the title bar, you can view the count of exception records that follow. You can drill down on a specific exception record for better identification of the problem. Options include:
- Field. Displays the name of the composite field in error.
- Source. Displays the vendor source of the field in error.
- Error Code. Displays the error code of the validation error.
- Status. Displays the status of the error.
- Severity. Displays the severity level of the exception. Options include:
–  Warning
–  Critical - Error. Describes the validation error.
- Resolution. Explains how to resolve the error.
- Business Description. Describes what caused the error.
The Edit Security Window
When you drill down on a specific security or exception record, the Reference Data Center displays the Edit Security window with the Security Details tab selected. Options include:
- Security Details tab. Provides information for each failed exception:
–  Field. Displays the name of the field with the exception.
–  Source. Displays the vendor source of the data.
–  Error Code. Displays the error code.
–  Status. Indicates whether the exception is an error or warning.
–  Severity. Indicates whether the exception is a warning or critical.
–  Validation. Displays the name of the validation rule.
–  Error. Describes the validation error.
–  Reason. Describes what caused the error.
–  Resolution. Explains how to resolve the error.
–  Last Updated By. Identifies who made the last update.
–  Last Updated. Provides a date and timestamp.
Clicking on an exception record brings you directly to the field with the exception in the Details tab. The Details tab displays the security master details based on the fields selected in the data strategy for the given security. Options include:
–  Field Name. Displays the name of the field. The system indicates whether there is an override (blue arrow), a failed gold copy field (red square) or failed vendor field (yellow triangle), and the release level (1 - Released for Trading, 2 - Released for Trading and Back Office, or 3 - Released with No Exceptions) to the left of the field name.
–  Current Day Gold Copy. Displays the value of the current day's gold copy security.Â
–  1st Vendor. Displays the value received from the first vendor. The name of the column displays the vendor source and date received.
–  2nd Vendor. Displays the second, third, and so forth vendors, as specified by the data strategy.
- Analytics tab. Displays security analytics based on the Analytics data strategy governing the security.
- Variable Rates tab. Displays variable rates based on the Variable Rates data strategy governing the security.
- Ratings tab. Displays security ratings based on the Ratings data strategy governing the security.
- Vendor History tab. Displays vendor history based on the Vendor History data strategy governing the security.
- Corporate Actions tab. Displays corporate actions if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Final Factor tab. Displays factors if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Schedules tab. Displays call and put schedules if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
- Third Party Cash Flows tab. Displays third party cash flows if specified in the Security data strategy governing the security. Note you can view and edit this information, however, it is not part of the full Reference Data Center workflow. That is, you cannot override and release an exception or authorize and reject an override.
The Monitor Workspace
The Monitor workspace displays the Automation Center workspace, allowing you to monitor Event Type equal to Reference Data Center events. You can monitor jobs/events status for any job you wish to select. The information displays below the results in several panes:
- Â Jobs/Events Status pane. This area lists all the jobs/events for the Reference Data Center event type.
- Â List/Dependencies/SLA pane. This pane displays the data strategies processed for the job/event selection above.
- Â Exceptions pane. This area displays the exception details for a data strategy selection above.