Browse Definitions :
Definition

two pizza rule

The 2 pizza rule is a guideline for deciding how many attendees should be invited to a meeting. According to the rule, every meeting should be small enough that attendees could be fed with two large pizzas.

An important goal of the 2 pizza rule is to prevent groupthink, a phenomenon that occurs when a large group's need for consensus overrides the judgment of individual group members. The rule also discourages HiPPO, an acronym that stands for the "highest paid person's opinion" or the "highest paid person in the office." HiPPO describes the tendency for lower-paid employees to defer to higher-paid employees when a decision has to be made.

The 2 pizza rule is often credited to Jeff Bezos, founder and CEO of Amazon. Bezos is known to have used 'two pizza' meetings and small project teams to foster a decentralized, creative working environment when Amazon was a startup.

Why 2 Pizzas?

Bezos' decision to keep meetings small in order to encourage productivity can be backed up by science. After devoting nearly 50 years to the study of team performance, the late Harvard researcher J. Richard Hackman concluded that four to six is the optimal number of members for a project team and no work team should have more than 10 members.

According to Hackman, this is because communication problems increase “exponentially as team size increases.” Ironically, the larger the team, the more time will be spent on communication instead of producing work.

 

This was last updated in February 2020

Continue Reading About two pizza rule

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close