whatsapp
AVNR Logo

How We Work

The operating model behind the delivery. How constraints shape decisions, how cycles run, and what handoff actually means.

Operating principles

The principles that guide how we make decisions and deliver work.

1

Constraints come before solutions

We map governance paths, security review requirements, and legacy integration points before proposing solutions. If a solution won't survive InfoSec review, it's not viable.

In practice

First call: "Who needs to sign off?" and "What failed review before?" Second call: options that fit those constraints.

2

Decisions must be reversible

Small interfaces, clear boundaries, documented trade-offs. If a choice locks you in or creates hidden dependencies, we flag it immediately. Even if it slows delivery.

In practice

We choose options with an exit path: standard formats, clear interfaces, and seams you can swap without rewriting everything.

3

Progress is measured by reviewable output

Progress is tracked through concrete artefacts stakeholders can validate: working code, documented decisions, integration proofs, threat models.

In practice

We optimise for outputs that unblock decisions, not activity that looks busy.

4

Ownership is non-negotiable

Every engagement is designed so your team owns the outcome. We don't deliver systems that require us to run them. You get decision records, runbooks and architectural context. Execution continues without us.

In practice

Documentation is produced alongside delivery, reviewed continuously, and validated before we step away.

Delivery loop

Delivery runs in short cycles with explicit checkpoints, surfacing risk early and keeping decisions under control.

Typical 2-week cycle structure

Day 1
Outcome definition

What needs to be true by day 10? What will stakeholders review? What unblocks the next step?

Written outcome, success criteria, review plan
Days 2-7
Build + document in parallel

Code, integrate, or prototype. Decision rationale and trade-offs are captured as we go, not retrofitted later.

Mid-cycle check (Day 4-5): Progress review. Are assumptions still valid? Do constraints need revisiting?
Day 8-9
Stakeholder review

Demo the working increment. Walk through decisions. Surface concerns before they become blockers.

Reviewable material (code, docs, integration proof) that stakeholders can validate
Day 10
Decision point

Continue to next cycle, pivot based on learnings, or close if the outcome is complete. No drifting cycles.

What changed, why, and what's next

Risk is controlled

Short cycles expose issues early, when they can still be addressed without escalation.

Transitions are predictable

Stakeholders see progress continuously, making ownership transfer routine rather than disruptive.

Decisions are auditable

Rationale and constraints are recorded as work progresses, so choices remain defensible long after delivery.

What delivery actually includes

Everything needed for your teams to operate and evolve the system independently.

Architecture Decision Records (ADRs)

Options considered and why they were rejected
Constraints that shaped the choice
Trade-offs accepted (performance vs. simplicity, cost vs. flexibility)
What would need to change if assumptions shift

Six months from now, someone will ask "why did we do it this way?" This lets them defend the decision or revisit it with full context.

Runbook and operational guide

How to deploy, configure, and monitor
Common failure modes and how to diagnose
Dependencies and what breaks if they're unavailable
Security assumptions and data handling rules

Your team needs to operate this without us. Clear runbooks mean fewer 2am escalations and more confident day-to-day operation.

Threat model and security review notes

Attack surfaces and mitigations
Data flows and where sensitive data lives
Authentication/authorization model
What InfoSec/Risk approved and any conditions

When your security team audits this later, or when you need SOC2/ISO certification, this documentation exists. Not retrofit. Not "we think it was...".

Operational readiness walkthrough

Walkthrough with your engineering team
Pair on a real scenario (deploy, debug, extend)
Q&A on architecture and operational concerns
Follow-up availability (usually 2-4 weeks, async)

Reading docs isn't the same as running it. We ensure your team can actually operate this before we step back.

Still have questions?

Every organisation has different constraints and approval paths. Let's discuss how this model maps to your specific context.

Book a conversation
30 minutes
Focused on your constraints
You decide what happens next