About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

DASH Adds Dark Liquidity Aggregation Algo

Subscribe to our newsletter

DASH Financial Technologies continues to innovate with SENSOR Dark, a next-generation dark liquidity aggregation algorithm designed to provide traders with optimal levels of transparency, performance and control as they attempt to minimise footprints when seeking dark liquidity in a fragmented market. The algo sources dark liquidity from significant venues across the US equity market, including independent venues, broker-operated pools, exchange hidden liquidity and conditional pools.

In line with all DASH execution solutions, users can customise their own SENSOR Dark execution strategies to meet specific performance and workflow goals. They can also view, measure, refine and visualise their activity using DASH’s web-delivered transparency solution, DASH360, which provides real-time analytics and visualisation to bring an order to life.

Stino Milito, head of electronic trading sales and co-chief operating officer at DASH, says: “While simple dark aggregation tools have been available in the market for some time, most were developed at a time when the liquidity landscape looked much different than it does today. SENSOR Dark has been designed with the functionality and real-time analytics necessary to effectively source dark liquidity today.”

With SENSOR Dark, traders can use a data-driven approach to customise routing selection by liquidity, block execution, price reversion/stability or any custom measurement; benefit from ‘block react’, a workflow solution that enables reaction to block execution with immediate and dynamic reallocation functionality; add ‘alpha seek’, performance enhancing workflow that dynamically changes venue selections available to take advantage when a symbol is outperforming versus the arrival price; define minimum fill size on a per-order and venue-by-venue basis, as well as set a minimum first fill to ensure a minimum-size dark print at the outset of the order; and have price flexibility by sourcing liquidity anywhere within the National Best Bid and Offer, including the midpoint or far touch, the offer when buying or the bid when selling.

Subscribe to our newsletter

Related content

WEBINAR

Upcoming Webinar: Data platform modernisation: Best practice approaches for unifying data, real time data and automated processing

Date: 17 March 2026 Time: 10:00am ET / 3:00pm London / 4:00pm CET Duration: 50 minutes Financial institutions are evolving their data platform modernisation programmes, moving beyond data-for-cloud capabilities and increasingly towards artificial intelligence-readiness. This has shifted the data management focus in the direction of data unification, real-time delivery and automated governance. The drivers of...

BLOG

Glimpse Markets Partners with Boltzbit to Embed Live-learning AI into Fixed Income Workflows

Glimpse Markets, the buy-side data sharing network focused on the cash bond markets, has partnered with Boltzbit, the deeptech AI company, to embed live-learning, agent-based AI directly into its buy-side bond data-sharing platform, as part of a multi-phase integration programme set to begin in early 2026. Rather than positioning AI as a downstream analytics layer,...

EVENT

Data Management Summit London

Now in its 16th year, the Data Management Summit (DMS) in London brings together the European capital markets enterprise data management community, to explore how data strategy is evolving to drive business outcomes and speed to market in changing times.

GUIDE

Applications of Reference Data to the Middle Office

Increasing volumes and the complexity of reference data in the post-crisis environment have left the middle office struggling to meet the requirements of the current market order. Middle office functions must therefore be robust enough to be able to deal with the spectre of globalisation, an increase in the use of esoteric security types and...