Feeds

Moving capital markets towards their nirvana

Commoditisation of transparency and speed

  • alert
  • submit to reddit

Build a business case: developing custom apps

In June 2006 IBM, through the IBM Institute for Value in conjunction with the Economist Intelligence Unit (EIU), published a research paper "The trader is dead; long love the trader".

The purpose was to set out the perceived trends in the Capital Markets business over the next 10 years. The research paper encompassed the views and responses of over 400 senior executives from buy side and sell side firms, large and small, from across the global regions. Additionally, views and opinions were sought from major service providers including exchanges clearing houses and central depositories, trade associations and financial services' regulators.

Transparency is expanding access to markets. This arises through the adoption of electronic means of tracking price and cost of execution, as well as consequential transaction execution. This may be exercised through more extensive and immediate access to data and enables institutions to achieve the so-called "alpha" (the value the portfolio manager seeks to add in the form of excess return) and "beta" (exposure to market investment) investment objectives.

It is anticipated by the majority of those surveyed that greater market transparency and speed of transaction execution will be commoditised in the sense that it will be available to most market participants on an efficient and cost effective basis. In consequence, it will be commoditised in a relatively short period of time.

Future focus will be on the development, enhancement and management of client relationships. This will force a change of emphasis for the major Tier 1 and Tier 2 plus banks whose focus has historically been to generate revenues and profits from transaction flows in asset classes rather than focus on the profitability of client relationships.

"The fundamental task for financial institutions will be to develop a perspective on risk: value will be created either by effectively assuming and managing risk or by mitigation of risk by eliminating it from the systems or managing it for their clients."

However, those surveyed were mindful of the immediate challenges to achieve those goals. From a technology perspective, among the challenges cited were high implementation costs, back and front office disconnect, lack of technology integration, insufficient and delayed access to data and weak vendor management.

The key sources of competitive advantage were deemed to be the depth of client relationship, product innovation, trustworthiness, risk management excellence and low cost provision. All these focus on one or more facets of the client relationship.

The top 10 technology innovations in order of perceived importance most likely to have an impact of strategic development (and, therefore, able to command premium pricing) all directly focus on developments improvement and maintenance of client relationships:

  • Risk measurements systems
  • Client analytics
  • Technology platforms to provide multi-asset class trading capabilities
  • Technology providing client/advisor/consultant electronic connectivity capabilities
  • Software to provide "smarter" trading
  • Service Oriented Architecture
  • Data distribution capabilities
  • Business continuity technology with the emphasis on provision of business resilience
  • Software for smarter asset management
  • Collaboration technologies

The dilemma for the IT industry must be to determine how aggressively it helps the capital markets sector forward to its Nirvana. Too rapid a move towards commoditisation of speed and transparency is likely to see some technology providers experience rapidly increased losses on their investment in technologies which premium price these service attributes.

Technology vendors hold some of the key ingredients to commoditisation of transparency and speed, which the institutions seek, but is there a financial risk to their own livelihoods if they commoditise their "transparency" and "speed" offerings too soon?

Copyright © 2006, IT-Analysis.com

Secure remote control for conventional and virtual desktops

More from The Register

next story
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Premier League wants to PURGE ALL FOOTIE GIFs from social media
Not paying Murdoch? You're gonna get a right LEGALLING - thanks to automated software
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer quits Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.