Feeds

Chasing the holy grail: the algorithmic arms race

The finance industry's secret weapon

Secure remote control for conventional and virtual desktops

Column Investment banks and major brokerage firms may or may not be leading the innovation in algorithms for securities trading purposes, but they take the lead in publicising their innovations in this field.

With trashy names reminiscent of graphic comics such as Dagger, Nighthawk, Cobra, Razor and so on, they are rolling these innovations out to their client base. Deployment of successful algorithms in electronic trading is perceived as an important service to generate deal flow from their trading clients.

Equally, it is yet another component of prime brokerage services, through which major investment banks and brokerage firms generate deal flow from their hedge fund clients. It should be remembered that Exchanges, ECNs and Multi-lateral Trading Facilities (MTFs) provide algorithmic trading capabilities integrated within their order management systems.

These institutions make substantial investment in the quantitative and mathematical skills to create the algorithms as well as the programming skills to provide commercial applications and integrate them into order management and execution systems. More importantly, these firms are responsible for the gradual adoption of algorithmic trading technology by the buy-side firms. With the exception of some highly specialised funds with the research and development resources and capabilities, it is highly unlikely that the buy-side would have adopted algorithmic trading technology.

A number of investment banks and brokerage houses claim to be leaders in the field of algorithmic trading capabilities. The criteria for claiming success for an algorithm are somewhat self-selecting. They include investment and trading performance, ease of use, accessibility, breadth of use across instruments and asset classes.

How durable are the algorithmic models? Are they ephemeral? Does wide scale adoption devalue their value? Do the innovators keep the “best inventions” to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

Conscious and concerted development of algorithmic trading models is about five years old, though the activity has been undertaken since the early 1990's but without the technology to give full rein to their commercial scope and application. As may be expected, comparative measurement of the durable success of algorithmic trading models in different market and trading environments is elusive. If it has been conducted it has been conducted in private. Some organisations claim success of their models over a period of time. It may be logically conjectured that “unsuccessful” algorithmic models are quietly dropped while successful models and maintained and, where appropriate, enhanced. Rather like Official Secrets, it is unlikely that any scientific research on the matter will be published at least until it is merely a matter of historical record.

What can be said is that unsuccessful models have not been so unsuccessful that they have had to be disclosed as publicly attributable to substantial trading losses.

Does wide scale adoption devalue their value? Do the innovators keep the "best inventions" to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

The “Algorithmic Arms Race” has now reached a stage where there are two distinct business models that drive the development of algorithmic trading capabilities. The first is driven by the quest for cost reduction, operational and trading efficiencies. These are themselves influenced by the competition between exchanges, ECNs and MTFs, investment banks and brokerage organisations and as they enhance the efficiencies and reduce the cost of access to their electronic trading services. This is the publicised side of the Algorithmic Arms Race. Institutions will publicise the service element of this model, though publicising the "trading" or "investment" performance will remain elusive.

The second is "the original model": development of complex and sophisticated trading technology which encompasses a greater range of events and criteria on which to base trading strategies; not only short term but taking a longer term perspective on issues which influence markets and economies. The former is likely to encompass the majority of financial institutions. The latter will be confined to specialist funds and elements of the proprietary trading desks of major global investment banks. This remains the secret side of the Arms Race.

Copyright © 2007, IT-Analysis.com

Security for virtualized datacentres

More from The Register

next story
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
Torvalds CONFESSES: 'I'm pretty good at alienating devs'
Admits to 'a metric ****load' of mistakes during work with Linux collaborators
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.