About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

ICE Data Services

Subscribe to our newsletter
Subscribe to our newsletter

Related content

WEBINAR

Recorded Webinar: How to move to a modern, component based trading architecture using a Buy AND Build approach

To remain competitive in today’s electronic markets, firms need trading architectures that support rapid innovation, effortless integration of new capabilities, and the agility to respond to shifting market demands. This is prompting technology leaders to move beyond the traditional “Buy vs. Build” debate, a false dichotomy that oversimplifies the choice between generic, off-the-shelf platforms and...

BLOG

From Pilots to Production: Capital Markets Firms Confront the Real Challenge of Scaling AI in Trading Workflows

Across capital markets, AI pilots are proliferating – on trading desks, in compliance functions, within data teams. The proof-of-concept phase has, for many firms, delivered enough evidence of value to settle the strategic debate. What remains stubbornly unresolved is the operational question: how to translate a growing patchwork of departmental experiments into scalable, production-grade capability....

EVENT

TradingTech Summit London

Now in its 15th year the TradingTech Summit London brings together the European trading technology capital markets industry and examines the latest changes and innovations in trading technology and explores how technology is being deployed to create an edge in sell side and buy side capital markets financial institutions.

GUIDE

Applications of Reference Data to the Middle Office

Increasing volumes and the complexity of reference data in the post-crisis environment have left the middle office struggling to meet the requirements of the current market order. Middle office functions must therefore be robust enough to be able to deal with the spectre of globalisation, an increase in the use of esoteric security types and...