Feeds

Chasing the holy grail: the algorithmic arms race

The finance industry's secret weapon

Security for virtualized datacentres

Column Investment banks and major brokerage firms may or may not be leading the innovation in algorithms for securities trading purposes, but they take the lead in publicising their innovations in this field.

With trashy names reminiscent of graphic comics such as Dagger, Nighthawk, Cobra, Razor and so on, they are rolling these innovations out to their client base. Deployment of successful algorithms in electronic trading is perceived as an important service to generate deal flow from their trading clients.

Equally, it is yet another component of prime brokerage services, through which major investment banks and brokerage firms generate deal flow from their hedge fund clients. It should be remembered that Exchanges, ECNs and Multi-lateral Trading Facilities (MTFs) provide algorithmic trading capabilities integrated within their order management systems.

These institutions make substantial investment in the quantitative and mathematical skills to create the algorithms as well as the programming skills to provide commercial applications and integrate them into order management and execution systems. More importantly, these firms are responsible for the gradual adoption of algorithmic trading technology by the buy-side firms. With the exception of some highly specialised funds with the research and development resources and capabilities, it is highly unlikely that the buy-side would have adopted algorithmic trading technology.

A number of investment banks and brokerage houses claim to be leaders in the field of algorithmic trading capabilities. The criteria for claiming success for an algorithm are somewhat self-selecting. They include investment and trading performance, ease of use, accessibility, breadth of use across instruments and asset classes.

How durable are the algorithmic models? Are they ephemeral? Does wide scale adoption devalue their value? Do the innovators keep the “best inventions” to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

Conscious and concerted development of algorithmic trading models is about five years old, though the activity has been undertaken since the early 1990's but without the technology to give full rein to their commercial scope and application. As may be expected, comparative measurement of the durable success of algorithmic trading models in different market and trading environments is elusive. If it has been conducted it has been conducted in private. Some organisations claim success of their models over a period of time. It may be logically conjectured that “unsuccessful” algorithmic models are quietly dropped while successful models and maintained and, where appropriate, enhanced. Rather like Official Secrets, it is unlikely that any scientific research on the matter will be published at least until it is merely a matter of historical record.

What can be said is that unsuccessful models have not been so unsuccessful that they have had to be disclosed as publicly attributable to substantial trading losses.

Does wide scale adoption devalue their value? Do the innovators keep the "best inventions" to themselves, deploying them strictly on their proprietary desks and/or for favoured clients?

The “Algorithmic Arms Race” has now reached a stage where there are two distinct business models that drive the development of algorithmic trading capabilities. The first is driven by the quest for cost reduction, operational and trading efficiencies. These are themselves influenced by the competition between exchanges, ECNs and MTFs, investment banks and brokerage organisations and as they enhance the efficiencies and reduce the cost of access to their electronic trading services. This is the publicised side of the Algorithmic Arms Race. Institutions will publicise the service element of this model, though publicising the "trading" or "investment" performance will remain elusive.

The second is "the original model": development of complex and sophisticated trading technology which encompasses a greater range of events and criteria on which to base trading strategies; not only short term but taking a longer term perspective on issues which influence markets and economies. The former is likely to encompass the majority of financial institutions. The latter will be confined to specialist funds and elements of the proprietary trading desks of major global investment banks. This remains the secret side of the Arms Race.

Copyright © 2007, IT-Analysis.com

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.