Home > Articles

This chapter is from the book

Your Enterprise and Conway’s Law

A long time ago (well, in 1967), in a galaxy not far away (our own), another really smart software developer presented an unavoidable reality of system development. It’s so unavoidable that it has become known as a law. The really smart developer is Mel Conway, and the unavoidable reality is known as Conway’s Law.

  • Conway’s Law: “Organizations which design systems are constrained to produce designs which are copies of the communication structures of these organizations” [Conway].

The correlation to the preceding description of Big Ball of Mud is fairly obvious. It’s generally a matter of broken communication that causes the “haphazardly structured; unregulated growth; repeated, expedient repair.”

Still, there is another big communication component that’s almost always missing: the business stakeholders and the technical stakeholders having productive communication that leads to deep learning, which in turn leads to innovation.

  • Assertion: Those who want to build good software that innovates must get this communication–learning–innovation pathway right before trying anything else.

Funny things, these laws. Is it possible to “get better” at a law? For example, humans can’t really “get better” at the law of gravity. We know that if we jump, we will land. The law and our earth’s gravitational influence even enable us to calculate how much hang time anyone who jumps can possibly have. Some people can jump higher and farther, but they are still subject to the same law of gravity as everyone else on earth.

Just as we don’t get better at the law of gravity, we don’t really get better at Conway’s Law. We are subject to it. So how do we get Conway’s Law, right? By training ourselves to be better at dealing with the unavoidable realities of this law. Consider the challenges and the possibilities.

Communication Is about Knowledge

Knowledge is the most important asset in every company. An organization cannot excel at everything, so it must choose its core competencies. The specific knowledge a company acquires within its domain of expertise enables building competitive advantage.

Although a company’s knowledge can be materialized in physical artifacts such as documentation, and in models and algorithms by means of source code implementations, these are not comparable to the collective knowledge of its workers. The greater part of the knowledge is carried by individuals in their minds. The knowledge that has not been externalized is known as tacit knowledge. It can be collective, such as the routines of unwritten procedures within the business, or the personal preferred ways of working that every individual possesses. Personal knowledge is about skills and crafts—the undocumented trade secrets and historical and contextual knowledge that a company has collected since its founding.

People inside the organization exchange knowledge through effective communication. The better their communication is, the better the company’s knowledge sharing will be. Yet, knowledge is not just shared statically as if feeding encyclopedic input with no other gain. Sharing knowledge with an achievement goal in mind results in learning, and the experience of collective learning can result in breakthrough innovation.

Knowledge Is Not an Artifact

Because knowledge is not something that one person passes to another in the same way that a physical object is exchanged, the knowledge transfer takes place as a combination of sense-giving and sense-reading, as illustrated in Figure 1.4 [Polanyi].

FIGURE 1.4

Figure 1.4 Tacit knowledge transfer through the process of sense-giving and sense-reading.

Sense-giving occurs when a person communicates knowledge. The knowledge is structured into information and externalized [LAMSADE]. The person on the receiving side undergoes the process of sense-reading. This individual extracts data from the information received, creating personal knowledge and internalizing it. The probability that two people will give the same meaning to the same information is determined not just by the accuracy of the communication that has occurred between those individuals, but also by past experiences and the specific contexts in which the receiver places it.

It is not guaranteed that the piece of information that someone receives is exactly what another person wants to communicate. This is illustrated with a concrete example.

The Telephone Game

The Telephone Game illustrates the trouble with certain communication structures. You might know this game by another name, but the rules are the same. People form a line, and at one end of the line a person whispers a message to the next person in line, which is then repeated to the next person, and so forth, until the message reaches the last person in the line. Finally, the last message receiver tells everyone the message that they received, and the person at the beginning of the line discloses the original message. Of course, the fun comes from the repeated message becoming badly distorted by the time it reaches the end.

What’s most interesting about this game and the effects on communication is that the distortion occurs at every separate point of communication. Everyone in the line, even those closest to the message’s origin, will be told something that they can’t repeat accurately. The more points of relay, the more distorted the message becomes.

In essence, every point of relayed communication creates a new translation. This highlights the reality that even communication between just two people is difficult. It’s not unfeasible to reach clarity and agreement, but it can be challenging to get there.

When this happens in business, it’s not a game, and it isn’t fun. And, of course, the more complex the message, the more likely it is for greater degrees of inaccuracy to occur. As Figure 1.5 shows, there are often many points of relay. In very large organizations, there might be even more than 20 levels. The authors often hear of so much hierarchy that it seems insuperably difficult for anything in the organization to be accomplished with any degree of accuracy, and the software developers near the end of the line marvel at it.

FIGURE 1.5

Figure 1.5 Typical communication structure from C-level to project managers to developers.

Reaching Agreement Is Hard

The negative feelings of team members, such as indifference, complacency, disillusionment, and demoralization, can be overcome. It’s done by helping the team create reachable goals and providing new, lightweight techniques, such as shaping the team for better communication and engaging in stepwise, value-driven restructuring of the software.

Yet, the separations between points of communication and even the style of communication at each level of hierarchy can cause a widening gap in business and technical stakeholders. When the communication gap is broad in the face of big changes, agreement is hard to achieve.

A noxious problem exists when technical leadership see themselves and their teams as threatened by criticism of their work and hints that big change is imminent. After all, the distorted message being heard intimates that what has existed for a long time isn’t sustainable. As has been noted more than a few times throughout history, humans have egos and more often than not are heavily invested in what they have produced as a result of hard work. This strong attachment is often referred to as being “married.” When an institution as tightly connected as marriage seems breakable, the involved parties often adopt a defensive posture that not only tightly grips what has been done, but also clings to how things have been done. Moving beyond that hardened stance isn’t easy.

There are also those from outside who strongly recommend the kind of changes that are incompatible with business as usual. This apparent adversary hasn’t gone through the decades of hard work under conflicting time forces that are blamed for the deep software debt and entropy that today throbs like two sore thumbs. All of these uncomfortable perceptions accumulate into a pressure cooker of emotions and shouts of “Executive betrayal!” in the conscious thoughts of technical leadership. It’s obvious that the responsible parties have been singled out and will now be repaid for ongoing delivery under unrelenting impossible circumstances with a swift shove under a speeding bus.

When technical leadership has these misgivings, they typically multiply their doubts by confiding in at least a few members of their teams who will support their concerns. Naturally those supportive team members themselves confide in others, and the fear leads to widespread resistance.

But Not Impossible

This whole problem is most often perpetuated by a company culture known as “us versus them.” This happens, once again, because of deficient communication structures. Glancing back at Figure 1.5, do you see a big problem? It’s the hierarchy, which breeds an “us versus them” mentality. Edicts come down from on high and subordinates carry out the orders. If this hierarchy is retained, executives shouldn’t expect outcomes that lead to cooperative change.

Cooperative change must emanate from leadership, which begins at the executive level. When executive leadership can see the untenable result of hierarchical command and control, the answer is not to replace the old controlled with the newly controlled.

In every endeavor, teams are by far more successful at large undertakings than are individuals. Mature sports teams succeed by crafting innovative playbooks and communicating each play to the whole team with tedious precision.

Acting like a team requires being a team. In teams, communication is not one way. Any one team member can have enough experience to suggest that something was overlooked in the playbook, or that a given play could be better with this or that additional move or removal of an inefficiency. When every team member is respected for their competency and experienced viewpoint, it serves to make communication that much more effective (Figure 1.6).

FIGURE 1.6

Figure 1.6 Optimal communication structures are the result of team play.

Consider these keys to optimal communication:

  • It’s us, not us and them.

  • Servant leadership must not be beneath anyone.

  • Realize the power in building strategic organizational structures.

  • No one should feel threatened for communicating their constructive viewpoints.

  • Positive influence is critical in motivating people toward constructive action.

  • Forming business–technical partnerships based on mutual respect is essential.

  • Deep communication, critical thinking, and cooperation are indispensable to achieve disruptive, transformational, software systems.

These strategic behavioral patterns are not new and novel. They are centuries old and are the practices of successful organizations.

Conway’s Law doesn’t leave anyone guessing about how to make organizational communication structures work for the greater good. As the conclusion of Conway’s paper states:

We have found a criterion for the structuring of design organizations: a design effort should be organized according to the need for communication.

Because the design which occurs first is almost never the best possible solution, the prevailing system concept may need to change. Therefore, flexibility of organization is important to effective design.

Ways must be found to reward design managers for keeping their organizations lean and flexible. [Conway]

These ideas are reflected in Figure 1.5 and are woven throughout this book.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020