Feeds

Chasing the holy grail: the algorithmic arms race

The finance industry's secret weapon

SANS - Survey on application security programs

Column Investment banks and major brokerage firms may or may not be leading the innovation in algorithms for securities trading purposes, but they take the lead in publicising their innovations in this field.

With trashy names reminiscent of graphic comics such as Dagger, Nighthawk, Cobra, Razor and so on, they are rolling these innovations out to their client base. Deployment of successful algorithms in electronic trading is perceived as an important service to generate deal flow from their trading clients.

Equally, it is yet another component of prime brokerage services, through which major investment banks and brokerage firms generate deal flow from their hedge fund clients. It should be remembered that Exchanges, ECNs and Multi-lateral Trading Facilities (MTFs) provide algorithmic trading capabilities integrated within their order management systems.

These institutions make substantial investment in the quantitative and mathematical skills to create the algorithms as well as the programming skills to provide commercial applications and integrate them into order management and execution systems. More importantly, these firms are responsible for the gradual adoption of algorithmic trading technology by the buy-side firms. With the exception of some highly specialised funds with the research and development resources and capabilities, it is highly unlikely that the buy-side would have adopted algorithmic trading technology.

A number of investment banks and brokerage houses claim to be leaders in the field of algorithmic trading capabilities. The criteria for claiming success for an algorithm are somewhat self-selecting. They include investment and trading performance, ease of use, accessibility, breadth of use across instruments and asset classes.

How durable are the algorithmic models? Are they ephemeral? Does wide scale adoption devalue their value? Do the innovators keep the “best inventions” to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

Conscious and concerted development of algorithmic trading models is about five years old, though the activity has been undertaken since the early 1990's but without the technology to give full rein to their commercial scope and application. As may be expected, comparative measurement of the durable success of algorithmic trading models in different market and trading environments is elusive. If it has been conducted it has been conducted in private. Some organisations claim success of their models over a period of time. It may be logically conjectured that “unsuccessful” algorithmic models are quietly dropped while successful models and maintained and, where appropriate, enhanced. Rather like Official Secrets, it is unlikely that any scientific research on the matter will be published at least until it is merely a matter of historical record.

What can be said is that unsuccessful models have not been so unsuccessful that they have had to be disclosed as publicly attributable to substantial trading losses.

Does wide scale adoption devalue their value? Do the innovators keep the "best inventions" to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

The “Algorithmic Arms Race” has now reached a stage where there are two distinct business models that drive the development of algorithmic trading capabilities. The first is driven by the quest for cost reduction, operational and trading efficiencies. These are themselves influenced by the competition between exchanges, ECNs and MTFs, investment banks and brokerage organisations and as they enhance the efficiencies and reduce the cost of access to their electronic trading services. This is the publicised side of the Algorithmic Arms Race. Institutions will publicise the service element of this model, though publicising the "trading" or "investment" performance will remain elusive.

The second is "the original model": development of complex and sophisticated trading technology which encompasses a greater range of events and criteria on which to base trading strategies; not only short term but taking a longer term perspective on issues which influence markets and economies. The former is likely to encompass the majority of financial institutions. The latter will be confined to specialist funds and elements of the proprietary trading desks of major global investment banks. This remains the secret side of the Arms Race.

Copyright © 2007, IT-Analysis.com

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.