Theory of constraints

A systematic approach to improving delivery by locating the resource, activity, or rule that caps performance and managing work around it. In resourcing, it targets bottleneck skills or equipment to raise throughput and shorten cycle time. It focuses improvement where it matters most.

Key Points

  • At any moment, one dominant constraint governs overall throughput and flow.
  • Constraints can be physical (equipment), human (skills, availability), process (policies, approvals), or external (vendors, compliance).
  • Improving non-constraints rarely improves system performance; protect and optimize the constraint first.
  • Use flow metrics (throughput, cycle time, queue length, WIP) to see where work stalls.
  • Expect the constraint to shift after improvements; re-check regularly.
  • Buffers and WIP limits help stabilize flow and shield the constraint from variability.

Purpose of Analysis

  • Spot the resource or rule that is throttling delivery so staffing and sequencing decisions target the real lever.
  • Reduce queues and handoff delays around scarce skills or equipment.
  • Guide short-term reallocations, cross-training, or supplier actions that unlock schedule gains.
  • Provide objective evidence for change requests or management escalation tied to flow impact.

Method Steps

  • Identify: Use data and observation to locate the step or resource with persistent backlog or longest queue.
  • Exploit: Make the constraint as effective as possible without major investment (clear priorities, remove interruptions, standardize work, ensure readiness).
  • Subordinate: Align non-constraint work to support the constraint (set WIP limits, sequence work to its pace, avoid starving or overfeeding it).
  • Elevate: Add capacity or capability if needed (hire, automate, cross-train, add vendors, invest in tools).
  • Repeat: After elevating, reassess because the constraint often moves elsewhere.

Inputs Needed

  • Resource calendars, assignments, and utilization reports.
  • Skills inventory and competency matrix.
  • Work-in-progress counts, queue lengths, wait times, and handoff data.
  • Throughput and cycle time trends by team, role, or work type.
  • Backlog and dependency map highlighting where work accumulates.
  • Process policies and approval steps that may limit flow.
  • Schedule baseline, current schedule, and milestones at risk.
  • Vendor SLAs, turnaround times, and contract constraints.

Outputs Produced

  • Constraint log naming the current constraint, its type, evidence, and impact.
  • Short-term action plan to exploit and subordinate around the constraint.
  • Capacity change proposals to elevate the constraint, with effort, cost, and expected benefit.
  • WIP limits, buffer sizes, and priority rules aligned to the constraint.
  • Updated resource allocation, schedule adjustments, and change requests if required.
  • Monitoring dashboard showing buffer consumption, queue trends, and throughput.

Interpretation Tips

  • Look for persistent queues, not just busy people; queues reveal the true constraint.
  • Protect the constraint’s time by stopping interruptions, unplanned work, and multitasking.
  • Measure before and after; small cycle-time improvements at the constraint can yield outsized schedule gains.
  • Do not chase 100% utilization everywhere; optimize end-to-end flow.
  • If buffer consumption is erratic, expect variability to overwhelm the constraint; add stability first.

Example

A cybersecurity review step has one qualified analyst, and features queue for days, delaying releases. The team maps queues and confirms the review is the constraint.

  • Exploit: Set clear intake criteria, schedule focused review blocks, remove ad hoc requests, and ensure complete packages arrive ready.
  • Subordinate: Limit upstream WIP, sequence work so high-value features hit the review at the right cadence, and pre-check artifacts.
  • Elevate: Cross-train a developer for basic checks and contract a part-time external reviewer for peaks.
  • Repeat: After improvements, test environment access becomes the new constraint and the cycle continues.

Pitfalls

  • Pursuing local efficiency (higher utilization) that worsens overall lead time.
  • Skipping exploitation and jumping straight to costly capacity increases.
  • Allowing upstream teams to overproduce, flooding the constraint.
  • Ignoring policy constraints such as batching, approval cadences, or release windows.
  • Assuming the constraint is permanent and failing to re-evaluate after changes.
  • Not instrumenting flow, leaving decisions to opinion rather than data.

PMP Example Question

A project manager observes long queues before a specialized testing station while other teams are underutilized. What is the BEST immediate action using the theory of constraints?

  1. Add more testers by submitting a change request for additional headcount.
  2. Reduce upstream WIP and schedule work to match the testing station’s pace.
  3. Have underutilized teams start more tasks to keep everyone busy.
  4. Re-baseline the schedule to reflect the current throughput.

Correct Answer: B — Reduce upstream WIP and schedule work to match the testing station’s pace.

Explanation: First exploit and subordinate to the constraint by aligning flow and preventing overloading. Capacity increases or re-baselining may come later if needed.

Leadership for Project Managers Course

Lead with clarity, confidence, and real impact. This Leadership for Project Managers course turns day-to-day challenges—unclear priorities, tough stakeholders, and cross-functional friction—into opportunities to guide teams and deliver outcomes that matter.

You’ll learn practical leadership skills tailored to project realities: setting direction without overcontrol, creating alignment across functions, and building commitment even when authority is limited. We go beyond theory with tools you can use immediately—one-sentence visioning, stakeholder influence maps, decision framing, and feedback scripts that actually land.

Expect hands-on frameworks, real-world examples, and guided practice to prepare for tough moments—executive readouts, resistance from stakeholders, and high-stakes negotiations. Downloadable templates and checklists keep everything actionable when the pace gets intense.

Ready to influence without waiting for a bigger title? Join a community of ambitious PMs, sharpen your edge, and deliver with purpose—project after project.



Build complete project plans in minutes with AI

Stop spending hours on documentation. Learn how to use AI to create charters, WBS, schedules, risk registers, and executive reports faster—while staying fully in control. This course gives you ready-to-use prompt templates and practical workflows based on real project work. No guesswork, no fluff—just tools you can apply immediately. Backed by Udemy’s 30-day money-back guarantee, so you can start risk-free.

Learn More