Theory of constraints

A systematic approach to improving delivery by locating the resource, activity, or rule that caps performance and managing work around it. In resourcing, it targets bottleneck skills or equipment to raise throughput and shorten cycle time. It focuses improvement where it matters most.

Key Points

  • At any moment, one dominant constraint governs overall throughput and flow.
  • Constraints can be physical (equipment), human (skills, availability), process (policies, approvals), or external (vendors, compliance).
  • Improving non-constraints rarely improves system performance; protect and optimize the constraint first.
  • Use flow metrics (throughput, cycle time, queue length, WIP) to see where work stalls.
  • Expect the constraint to shift after improvements; re-check regularly.
  • Buffers and WIP limits help stabilize flow and shield the constraint from variability.

Purpose of Analysis

  • Spot the resource or rule that is throttling delivery so staffing and sequencing decisions target the real lever.
  • Reduce queues and handoff delays around scarce skills or equipment.
  • Guide short-term reallocations, cross-training, or supplier actions that unlock schedule gains.
  • Provide objective evidence for change requests or management escalation tied to flow impact.

Method Steps

  • Identify: Use data and observation to locate the step or resource with persistent backlog or longest queue.
  • Exploit: Make the constraint as effective as possible without major investment (clear priorities, remove interruptions, standardize work, ensure readiness).
  • Subordinate: Align non-constraint work to support the constraint (set WIP limits, sequence work to its pace, avoid starving or overfeeding it).
  • Elevate: Add capacity or capability if needed (hire, automate, cross-train, add vendors, invest in tools).
  • Repeat: After elevating, reassess because the constraint often moves elsewhere.

Inputs Needed

  • Resource calendars, assignments, and utilization reports.
  • Skills inventory and competency matrix.
  • Work-in-progress counts, queue lengths, wait times, and handoff data.
  • Throughput and cycle time trends by team, role, or work type.
  • Backlog and dependency map highlighting where work accumulates.
  • Process policies and approval steps that may limit flow.
  • Schedule baseline, current schedule, and milestones at risk.
  • Vendor SLAs, turnaround times, and contract constraints.

Outputs Produced

  • Constraint log naming the current constraint, its type, evidence, and impact.
  • Short-term action plan to exploit and subordinate around the constraint.
  • Capacity change proposals to elevate the constraint, with effort, cost, and expected benefit.
  • WIP limits, buffer sizes, and priority rules aligned to the constraint.
  • Updated resource allocation, schedule adjustments, and change requests if required.
  • Monitoring dashboard showing buffer consumption, queue trends, and throughput.

Interpretation Tips

  • Look for persistent queues, not just busy people; queues reveal the true constraint.
  • Protect the constraint’s time by stopping interruptions, unplanned work, and multitasking.
  • Measure before and after; small cycle-time improvements at the constraint can yield outsized schedule gains.
  • Do not chase 100% utilization everywhere; optimize end-to-end flow.
  • If buffer consumption is erratic, expect variability to overwhelm the constraint; add stability first.

Example

A cybersecurity review step has one qualified analyst, and features queue for days, delaying releases. The team maps queues and confirms the review is the constraint.

  • Exploit: Set clear intake criteria, schedule focused review blocks, remove ad hoc requests, and ensure complete packages arrive ready.
  • Subordinate: Limit upstream WIP, sequence work so high-value features hit the review at the right cadence, and pre-check artifacts.
  • Elevate: Cross-train a developer for basic checks and contract a part-time external reviewer for peaks.
  • Repeat: After improvements, test environment access becomes the new constraint and the cycle continues.

Pitfalls

  • Pursuing local efficiency (higher utilization) that worsens overall lead time.
  • Skipping exploitation and jumping straight to costly capacity increases.
  • Allowing upstream teams to overproduce, flooding the constraint.
  • Ignoring policy constraints such as batching, approval cadences, or release windows.
  • Assuming the constraint is permanent and failing to re-evaluate after changes.
  • Not instrumenting flow, leaving decisions to opinion rather than data.

PMP Example Question

A project manager observes long queues before a specialized testing station while other teams are underutilized. What is the BEST immediate action using the theory of constraints?

  1. Add more testers by submitting a change request for additional headcount.
  2. Reduce upstream WIP and schedule work to match the testing station’s pace.
  3. Have underutilized teams start more tasks to keep everyone busy.
  4. Re-baseline the schedule to reflect the current throughput.

Correct Answer: B — Reduce upstream WIP and schedule work to match the testing station’s pace.

Explanation: First exploit and subordinate to the constraint by aligning flow and preventing overloading. Capacity increases or re-baselining may come later if needed.

AI for Agile Project Managers and Scrum Masters

Become an AI-first leader and transform your agile practice by leveraging artificial intelligence as your most powerful co-pilot. This course is designed to help you drive efficiency, insight, and innovation, ensuring you stay at the forefront of a rapidly evolving project management landscape.

This isn't about replacing human intuition—it's about augmenting it. You'll master prompt engineering to automate mundane tasks, freeing up your time for high-impact strategic leadership and creative problem-solving. Learn to refine backlogs, create strategic roadmaps, and integrate AI seamlessly into your agile ceremonies.

Gain predictive power by using AI-driven insights to anticipate project risks and seize new opportunities for more reliable outcomes. We deliver practical, prompt-based workflows and proven strategies built around real-world agile challenges that you can implement immediately within your framework.

Master foundational AI concepts specifically relevant to Scrum environments while developing advanced skills to handle diverse agile scenarios. You will learn to champion an AI-enabled culture within your organization, fostering a dynamic environment of continuous improvement and superior team delivery.

Ready to lead the future of agile and make data-driven decisions that cut through complexity? Join a community of forward-thinking professionals and position yourself as an indispensable leader in the AI era. Enroll now and unlock your future!



Stop Managing Admin. Start Leading the Future!

HK School of Management helps you master AI-Prompt Engineering to automate chaos and drive strategic value. Move beyond status reports and risk logs by turning AI into your most capable assistant. Learn the core elements of prompt engineering to save hours every week and focus on high-value leadership. For the price of lunch, you get practical frameworks to future-proof your career and solve the blank page problem immediately. Backed by a 30-day money-back guarantee-zero risk, real impact.

Enroll Now
``` ### Marketing Notes for this Revision: * **The Hook:** I used the "Stop/Start" phrasing from your landing page description because it creates a clear transformation for the user. * **The Value:** It highlights the specific pain point mentioned in your text (drowning in administrative work) and offers the "AI Assistant" model as the solution. * **The Pricing/Risk:** I kept the "price of lunch" and "guarantee" messaging as it is a powerful way to reduce friction for a Udemy course. Would you like me to create a second version that focuses more specifically on the "fear of obsolescence" mentioned in your landing page info?