1. Identify the systems constraints. 2. Decide how to exploit the constraints. 3. Subordinate everything else to the constraints. 4. Elevate the constraints. 5. If a constraint has been-broken, repeat steps 1 through 4.

%d bloggers like this: