Browse Definitions :
Definition

two pizza rule

Contributor(s): Ivy Wigmore

The 2 pizza rule is a guideline for deciding how many attendees should be invited to a meeting. According to the rule, every meeting should be small enough that attendees could be fed with two large pizzas.

An important goal of the 2 pizza rule is to prevent groupthink, a phenomenon that occurs when a large group's need for consensus overrides the judgment of individual group members. The rule also discourages HiPPO, an acronym that stands for the "highest paid person's opinion" or the "highest paid person in the office." HiPPO describes the tendency for lower-paid employees to defer to higher-paid employees when a decision has to be made.

The 2 pizza rule is often credited to Jeff Bezos, founder and CEO of Amazon. Bezos is known to have used 'two pizza' meetings and small project teams to foster a decentralized, creative working environment when Amazon was a startup.

Why 2 Pizzas?

Bezos' decision to keep meetings small in order to encourage productivity can be backed up by science. After devoting nearly 50 years to the study of team performance, the late Harvard researcher J. Richard Hackman concluded that four to six is the optimal number of members for a project team and no work team should have more than 10 members.

According to Hackman, this is because communication problems increase “exponentially as team size increases.” Ironically, the larger the team, the more time will be spent on communication instead of producing work.

Communication lines

 

This was last updated in February 2020

Continue Reading About two pizza rule

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

I was not aware abotu two-pizza rule. thanks for boosting my knowledge.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close