top of page

02

Real Estate Driven Investing

 

Asset Classes: Credit, Equities, Real Assets

Tools: Computer ScienceFinancial Engineering 

Strategy: Dirt and Data

Alpha Generation
ALPHA GENERATION
We use alternative data, ML/AI, and quantum computing to develop quantitative, alpha-generating, investment strategies. Our quantamental approach - we look deep inside data and analyze alpha signals - we apply computer science and financial engineering methodologies -  we build the investment thesis through a perspective backed by years of real estate investing experience and fundamental practices. Data = NOI = IRR = Alpha.
Risk Management
RISK MANAGEMENT
If Google’s AI algorithm can predict heart disease by looking at your eyes – then using a thermostat to forecast NOI (or a CMBS default) through a neural network is a much easier feat.*
​
We employ data science and quantitative approaches to manage asset and portfolio level risk. Specifically, we look at volatility and correlations across variables, including: NOI; DCSR; LTV; Occupancy Levels; Property/Rental Values; and Cap Rates. By incorporating alternative data we are able to more accurately predict these metrics and assess risk. Consequentially, this enables us to develop risk models and hedge strategies, both in the public and private markets, across equities, credit products, and real assets. 

*verily.com

Blockchain / Smart Contracts

We use distributed ledger technology – digital trust, provable and intrinsic to the system without reliance on an external authority – efficient data management (single source of data across risk, finance, etc.).

Quantum Computing

We use Cloud-based quantum computing to run algorithms and statistical simulations  – binary to the superposition.

​

Our team has experience beta testing applications on IBM Q and the Rigetti Forest (pyQuil).

Cognitive Analytics/NLP/ML/AI

We use search and content analytics engines to shape and clean data – identify patterns, trends and insights that drive better decision-making – parse structured and unstructured data (multiple mediums) through NLP/ML/AI to develop actionable intel and predictive models.

Encryption/Cybersecurity

We use government-grade encryption to protect data and comply with regulatory and compliance requirements – “pervasive encryption” database, data set or disk level without App modification.

 

We implement stringent cybersecurity protocols, policies, and procedures – firewalls, intrusion prevention systems, identity and access management. We engineer cryptographic validation processes – Zero-knowledge proofs.

Methodologies
bottom of page