The Cutter AdvantEdge is our regularly published newsletter presenting our latest insights on issues impacting investment technology and operations.
The goal of technology innovation programs can be as lofty as harnessing the ideas of the brightest members of an organization or as practical as keeping up with the firm next door.View Issue
GIPS 2010 mandated many new and rigorous requirements for GIPS compliance and, according to a recent CutterBenchmarking survey conducted in early 2011, only 20% of firms responding at the time were compliant with the new requirements.View Issue
Investment managers have long struggled to manage the multitude of Best of Breed systems from different vendors that support their investment processes.View Issue
Buy-side asset managers are becoming increasingly focused on finding ways to successfully manage their growing stable of third party providers and ensuring that the services and deliverables meet the asset managers’ expectations.View Issue
Data management programs are never born or executed in a vacuum. The successful program is seen as a means to a greater end—achieving the firm’s medium to long-term strategic objectives.View Issue
CutterResearch reports are the proprietary property of Cutter Associates and our members who have entered into confidentiality agreements. They contain information that is proprietary and confidential to Cutter as well as to the vendors discussed within the reports (the "Vendors"). Disclosure of the information contained in the reports could cause irreparable harm to Cutter and/or the Vendors.
By selecting "I Agree" below, you agree to safeguard this information with the same care as your firm affords its own confidential information. You will not provide access to this information to anyone who is not an employee of your firm and will not distribute this information outside your firm. Furthermore, you will not provide access to this information to any employee of any subsidiary, unit, department or division of your firm that is engaged in any aspect of the software business involving third parties, including, without limitation, selling or otherwise providing software to third parties, assisting third parties in the selection or implementation of software, or providing investment related software information to third parties (collectively, the "Prohibited Recipients").