Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Communications

Hedge Funds: It's Time to Get Bullish On Social Media, LinkedIn

By Mary Beth Hamilton,
Tuesday, January 20th, 2015

Trying to avoid social media is increasingly futile, even for hedge funds. We live in a ‘sharing’ culture, so it’s time to embrace it and control (or at least contribute to) your online profile.

In its 2015 predictions article, third-party marketing firm Agecroft Partners listed increased social media usage by hedge fund managers and investors as a key trend, and here’s why:

“…Social media is being used for research, to build stronger relationships and help promote a firms’ brands in the market place. Some managers are also using it to promote their investment ideas in order to create a catalyst for a security. The most commonly used social media is LinkedIn, which is broadly used throughout the industry. In 2014, Twitter was used by many people in the industry for the first time and this is expected to increase in 2015. Finally, we are beginning to see some use in YouTube where organizations are creating videos that can be posted on websites, distributed through social media or emailed to a distribution group…”(Source: Top Hedge Fund Industry Trends for 2015 by Don Steinbrugge)

Getting the Basics Right: LinkedIn

If a hedge fund manager has time for only one social media outlet, LinkedIn is the one. Over 332 million people use LinkedIn, and new members join at a rate of 2 per second. Additionally, 40% of users check LinkedIn daily (source: Digital Marketing Ramblings).

And from a search perspective, your LinkedIn profile is almost guaranteed to come up on the first page of results for a Google search of your name. So let’s look at how hedge fund managers can enhance their LinkedIn profiles.

LinkedIn Profile Basics

  • You need a picture. People won’t take you seriously or want to connect with you if they can’t see what you look like. Plus, your profile is 11 times more likely to be viewed if you have a picture.

  • Write a summary. This is an open space that allows you to hone in on the key qualities, attributes and skills you want to highlight.

  • Include all (relevant) job experience. When you add your company, be sure it is linking to the firm’s LinkedIn page as this is an easy way to direct your connections back to your firm’s page after viewing your profile.

  • Add skills. From a personal brand perspective, adding skills is an easy way for people to find you.

Categorized under: Launching A Hedge Fund  Hedge Fund Operations  Communications  Trends We're Seeing 



Happy New Year! Employee Resolutions for 2015

By Katie Sloane,
Thursday, January 15th, 2015

Happy New Year, all!

As we embark on the New Year, there is no better time to reflect on 2014 and set new goals for the future, both personal and professional. We’ve asked a few of our employees at Eze Castle Integration what their aspirations are for 2015. Check out what some of their responses were below.2015

  • "Eat out less and cook at home more often." - Jim Bove, Systems Engineer
     

  • "To learn more about technology. You can never learn enough!" - Tim Macdonald, Product Manager
     

  • "To travel more." - Elizabeth Martin, Resource Coordinator

Categorized under: Trends We're Seeing  Hedge Fund Operations  Communications  Project Management  Software 



IT Security Etiquette: A Best Practice Guide (Video)

By Kaleigh Alessandro,
Thursday, December 11th, 2014

If you’re a loyal Hedge IT reader, you may remember we highlighted a few simple dos and don’ts a few months ago that, when utilized, can go a long way in shoring up your firm’s security. To make it easy, we’ve put these tips together into a video. Take a look below and discover a vast range of security tips and tricks from email encryption to proper security measures for protecting computers and mobile devices. 

 

Categorized under: Videos And Infographics  Cloud Computing  Disaster Recovery  Security  Hedge Fund Operations  Infrastructure  Communications  Business Continuity Planning  Trends We're Seeing 



Throwback Thursday: History of the Eze Private Cloud

By Katie Sloane,
Thursday, December 4th, 2014

Less than ten short years ago, Eze Castle Integration saw a shift in the market and gap in the cloud space. Eze Private Cloud HistoryFirms had to hire multiple third-party vendors to fully outsource their IT needs, public cloud environments fell short of hedge fund security demands and service level contracts varied drastically. Fast-forward to today, and that very same spark of ideation has progressed to completely revolutionize hedge fund IT.  In the spirit of Throwback Thursday, today we're reflecting on the journey and growth of our very own Eze Private Cloud.  

In 2005, Eze Castle built and deployed the first hosted cloud platform for a large hedge fund based in New York City. By 2007, 18 funds spun out from the initial firm, each selecting Eze Castle as their trusted cloud platform provider. The following year, the company began building the foundation for the Eze Private Cloud.  The same year marked the opening of Eze Castle’s hedge fund hotel in New York City. The environment, which supported more than 200 users, united the company’s cloud computing platform and fully managed office suites for startup funds.   

Categorized under: Eze Castle Milestones  Launching A Hedge Fund  Cloud Computing  Hedge Fund Operations  Infrastructure  Communications  Software  Trends We're Seeing 



10 Holiday Travel Security Safety Tips

By Katie Sloane,
Tuesday, November 25th, 2014

Traveling with electronic devices puts personal and critical business information at risk. As we embark on the busy holiday travel season, we decided to share some useful tips to help prevent your data and devices from falling into the wrong hands. Here are our top 10:smartphones tablets mobile devices

  1. Back up Your Data Before You Leave: Prior to traveling, back up data that is stored on your device(s) onto media that will not be taken with you on your travels. For example, on a storage card, cloud, or computer, if you are not bringing the latter device on your trip. Furthermore, ensure you do not have social security numbers, passwords, credit card information and other sensitive data stored on your devices. If you do, save this information in a more secure place and remove it from your portable devices.

  2. Travel Light: If you do not need it, do not bring it on your trip. Only devices that are necessary should accompany you while traveling.

Categorized under: Security  Communications  Software  Trends We're Seeing 



Crisis Communications Tips for Business Continuity

By Matt Donahue,
Tuesday, November 18th, 2014

How important is day to day communications within your company/firm? If an incident or disaster occurred today, how would your organization respond? Do you have a team or group designated to develop messages for both internal (employees, vendors, third parties, building management) and external (public, employee families, media) contacts? Have they practiced? When the pressure is on, is your organization prepared if a disaster or event suddenly puts your firm under the microscope with an onslaught of internal/external calls, questions, requests, emails, social media messages or media requests?Communication

Crises and disasters continue to happen across borders and industries. Let’s not forget some of the more recent large scale disasters such as Hurricane Katrina, Typhoon Haiyan, Deepwater Horizon, Fukushima, Hurricane Sandy, and, of course, the ongoing major data breaches, just to name a few. That list doesn’t include more common events that may not make the major news networks such as utility failures, office fires, and systems outages. Smaller events like previously mentioned can cause minimal to significant disruption to business operations. This is why developing and practicing a variety of communications is vital in an organization’s response to an incident.

Some of these events can be predicted in advance, giving an organization time to make decisions, analyze other organization’s responses, consider impacts, and communicate a message or action. Sometimes events are sudden, such as an earthquake or active shooter. These events require immediate actions, decisions, and communications to be made. In either case - an immediate or delayed event - communication is critical to demonstrating proper leadership and providing employees with proper direction, especially if the event is centered specifically on your organization.

Categorized under: Business Continuity Planning  Disaster Recovery  Security  Hedge Fund Due Diligence  Hedge Fund Operations  Communications  Trends We're Seeing 



2014 Benchmark Study Results: Top Hedge Fund Applications Revealed

By Katie Sloane,
Thursday, November 13th, 2014

The results from our Global Hedge Fund Technology and Operations Benchmark Study are in and here is a snapshot of the 2014 findings. You can find the complete report here. We surveyed 279 buy-side firms across the United States, United Kingdom and Asia in order to discover their front, middle, and back office technology and application preferences.Hedge Funds by Type

Respondent Profile[Hedge Funds by Type]All survey respondents fell into the following categories within the financial industry: hedge fund (58%), asset/investment manager (13%), private equity firm (3%), fund of fund (3%), and family office (3%). Additionally, 13 percent fell into an ‘other’ category, which included financial firm types such as venture capital, advisory, fund management, quant and wealth management.  

Firms surveyed fell into three asset groups: thirty-three percent (33%) reported their assets under management (AUM) as less than $100 million; twenty-eight percent (28%) fell between $101 and $500 million; and the majority (39%) reported over $500 million AUM. 

In regards to investment strategy, long/short equity continues to dominate as the most favorable with 50 percent (50%) of respondents reporting this to be their primary investment strategy.  Additional preferred strategies include credit (8%), fixed income (6%), emerging markets (5%), event driven (4%), and distressed debt (3%). Twenty-four percent (24%) of firms fell into an “Other” category that included a wide variety of investment strategies such as commodities, derivatives, merger arbitrage, relative value, securities, global macro, and long only. In 2014, the top primes employed by firms are Goldman Sachs, Morgan Stanley, JP Morgan, Credit Suisse and UBS (same as 2013 results).

Categorized under: Hedge Fund Operations  Launching A Hedge Fund  Cloud Computing  Hedge Fund Due Diligence  Communications  Outsourcing  Software  Trends We're Seeing 



Sneak Peek: 2014 Hedge Fund Benchmark Study Results

By Kaleigh Alessandro,
Tuesday, November 11th, 2014

In it's fourth year running, our Global Hedge Fund Technology Benchmark Study reveals the top technology systems and applications used by investment management firms around the world. And while we aren't due to officially release the results until tomorrow - register for our webinar to hear them live - we thought we'd share a little sneak peek in the form of an infographic.

Take a look below and discover how your hedge fund and investment management firm peers are using technology to power their firm operations.

Categorized under: Hedge Fund Due Diligence  Launching A Hedge Fund  Cloud Computing  Security  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Software  Trends We're Seeing  Videos And Infographics 



Happy Halloween! A Look at the Scariest IT Moments of 2014

By Katie Sloane,
Thursday, October 30th, 2014

Over the years, cybercrime has evolved, matured and increased in frequency. Target groups vary from case to case and victims range from big merchants and high-end retailers to celebrities and common folk. On the eve of Halloween, we’ve dug up some of the scariest cyber-attacks in 2014.Scary IT Hack Ghost

CryptoLocker

One of the more innovative hacks in recent years started making headway in Great Britain in September 2013. CryptoLocker utilizes malware to encrypt and freeze victims’ sentimental and valuable files on infected computers. After successfully locking the computer, a ransom note appears on the victim’s screen demanding money in return for their files. If the victim fails to make payment, the computer remains locked and files are unsalvageable.  

More than $100 million in losses were attributed to the cybercriminals’ schemes as well as hundreds of thousands of infected computers. Computer security companies estimate that CryptoLocker infected over 234,000 computers worldwide, including more than 100,000 in the United States. 

Categorized under: Security  Cloud Computing  Communications  Software  Trends We're Seeing 



Four Signs It's Time to Break up with Your IT Provider

By Kaleigh Alessandro,
Thursday, October 16th, 2014

Broken HeartIn any relationship, when things are good, they’re usually pretty good. And when things are bad, sometimes they are really bad. There may come a point when you need to evaluate whether you’re still a good fit together.
 
Just like with a romantic relationship, your firm’s connection to a service provider (especially an infrastructure/cloud provider you rely on daily) should be strong enough to withstand a few hiccups and healthy enough to warrant open communication at all times. In some cases, it might be clear that you’re in a good place and moving forward together, but sometimes there are sure signs it’s time to call it quits.
 
Here are a few of those signs:

1. Your provider’s service levels are not up to snuff.

Maybe you recently experienced a major service outage or find that you not-so-conveniently have to work around confusing and interrupting maintenance schedules during work hours. You’re constantly frustrated and don’t feel like you are receiving the level of support that was agreed to – both verbally and as part of your Service Level Agreement (SLA).

Your SLA should clearly indicate the uptime standard (e.g. 99.995% availability) as well as repercussions to any breaches in the contract (for example, service credits) and associated RPOs if disaster recovery is involved

Categorized under: Cloud Computing  Disaster Recovery  Security  Hedge Fund Due Diligence  Hedge Fund Operations  Help Desk  Infrastructure  Communications  Outsourcing  Trends We're Seeing 



View earlier posts in the archive

Recent Posts / All Posts

 

Subscribe to Hedge IT

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives