Browse Definitions :
Definition

Conway's law

Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it. The law is commonly associated with software development but is considered applicable to systems and organizations of all types.

Melvin Conway, a computer scientist and programmer, developed his theory in 1967 as the basis for a paper, "How do committees invent?" that he was submitting to the Harvard Business Review (HBR). Here's the original formation: "Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization's communication structure."

HBR rejected the paper on the grounds that Conway had not proved his thesis; the paper was published in April 1968 in Datamation, the leading IT magazine of the time. Fred Brooks cited the observation in his article, "The Mythical Man-Month" and referred to it as Conway's law.

The Harvard Business School subsequently conducted a study, "Exploring the Duality between Product and Organizational Architectures," to attempt to prove Conway's thesis. Researchers compared the codebases of multiple applications of the same type that had been created by loosely-coupled open source development teams and tightly-coupled teams. They found that the tightly-coupled teams tended to develop monolithic codebases while the loosely-coupled teams tended to create more modular codebases. It has been observed, similarly, that if multiple teams are working on program modules and inter-team communication is poor, the interfaces of the program will reflect that fact.

Conway's law is often mentioned in reference to the DevOps trend, which is based on effective communication and collaboration among development and operations teams.

See Dan Slimmon's presentation, Conway's Law: The Skeleton of DevOps:

This was last updated in October 2016

Continue Reading About Conway's law

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close