by Lea Strickland | Mar 16, 2011 | Glossary
1. Identify the systems constraints. 2. Decide how to exploit the constraints. 3. Subordinate everything else to the constraints. 4. Elevate the constraints. 5. If a constraint has been-broken, repeat steps 1 through 4.