Capstone 2: Design Your Network Audit and Expansion Plan
Map What You Have, Find What You Need, Build What's Missing
Overview
The most consistent finding across all the luck research reviewed in this book is also the most actionable: the structure of your network — not just its size, not just who you know, but how your connections are arranged and where they sit relative to each other — is the single strongest predictor of the fortunate encounters, information flows, and opportunities available to you at any given moment.
This capstone asks you to take that finding seriously in a way that general networking advice never does. You will conduct a rigorous audit of the network you actually have right now — not the one you hope to have, not the one you would describe in an optimistic mood, but the actual current state of your relationships and their structural properties. Then you will analyze it using the frameworks from Chapters 19-21 to identify your most significant gaps. Then you will design and begin executing a specific 90-day plan to address them.
The outcome of this capstone is not a set of insights. It is a system — a structured, sequenced plan for building the network that generates the kind of luck you are actually trying to have.
You will not need access to any other part of the book to complete this capstone. Everything you need is here.
Learning Objectives
By completing this capstone, you will be able to:
- Apply Granovetter's weak-tie theory from Chapter 19 to your own actual network and identify where the weak-tie deficit is costing you opportunity
- Use Burt's structural hole concept from Chapter 21 to locate high-value brokerage positions within and adjacent to your network
- Build a systematic, prioritized audit of network gaps using multiple analytical dimensions
- Design a concrete, sequenced 90-day expansion plan with specific targets, methods, and timelines
- Distinguish between network size (how many people you know) and network quality (what structural properties those connections have)
- Develop a sustainable maintenance system that keeps the network alive beyond the initial 90-day effort
Background Theory: What Makes a Network Lucky
Before mapping, the analytical vocabulary needs to be clear. These are the three structural properties that most determine a network's luck-generating capacity.
Weak Ties (Granovetter, Chapter 19)
Mark Granovetter's foundational research on job searching demonstrated a counterintuitive finding that has been replicated many times since: the most valuable job leads came not from close friends (strong ties) but from acquaintances (weak ties) — people known only slightly, encountered infrequently. The mechanism is informational: strong ties inhabit your same social world, attend the same events, read the same things, and know the same people. They are informationally redundant with each other and with you. Weak ties, by definition, inhabit different social worlds — and those different worlds contain information, connections, and opportunities that have not yet reached you.
The practical implication is that the size of your outer ring of acquaintances matters more for luck generation than the depth of your inner ring of close relationships. Most people over-invest in maintaining and deepening strong ties (people they already know well) and systematically under-invest in cultivating and expanding weak ties (people they know slightly or have met once or twice). This audit is designed to make that imbalance visible.
Structural Holes (Burt, Chapter 21)
Ronald Burt's research introduced the concept of structural holes: the gaps between clusters of people who are not connected to each other but who are both connected to you. If your college friends do not know your summer internship colleagues, who do not know your hometown mentors, who do not know the online community you are active in — and you are the only node that touches all four clusters — you occupy what Burt calls a brokerage position. You have access to the information, perspectives, and opportunities circulating in each separate cluster, and you have the unique ability to introduce people across clusters when it would benefit them both.
Being in a brokerage position confers a structural advantage in information access, in perceived value to multiple communities, and in the probability of serendipitous encounters that could not happen within any single cluster. The audit is designed to identify whether you currently occupy any brokerage positions and where new ones could be built.
Network Diversity
A network whose members are concentrated in a single domain, industry, age group, geography, or community type is informationally homogeneous — it tells you things you mostly already know and introduces you to people who mostly already know what you know. A diverse network spans multiple domains, ages, geographies, and professional and personal communities. It generates the cross-domain information transfer that produces the most surprising and useful serendipitous discoveries.
The luck research is consistent on this point: the opportunities most people describe as "out of the blue" or "pure luck" almost always trace, on examination, to information that arrived from an unexpected direction — from a part of the network that is genuinely different from the core. Diversity is not a social good for this capstone's purposes (though it is that too). It is a structural property that determines the rate and variety of fortunate encounters.
Part 1: The Network Audit
Step 1: Map Your Network Tier by Tier
You will need paper, a whiteboard, a mapping tool, or a document with space for a visual or structured list. The mapping exercise takes 30-45 minutes if done honestly. Do not rush it or do it from memory alone — pull up your phone contacts, your email history, your social media connections, your mental list of "people I should be in touch with." The goal is accuracy, not elegance.
Tier 1: Strong Ties (5-15 people)
These are the people you are in genuine, ongoing contact with. You would call them in a professional or personal crisis. They know what you are currently working on. You know the same about them. The contact is mutual and maintained without significant effort on either side.
List each person by first name or initials. For each, record: - Primary domain or industry - How you met and how long you have known them - What they know about your current goals and work - Whether they are connected to anyone else in your Tier 1
An honest Tier 1 is typically 5-10 people. If you list 25, you are likely conflating strong ties with meaningful acquaintances. If you list 2, you may be applying too strict a definition. The right threshold is: would you reach out to this person with a professional question or opportunity without it feeling awkward?
Tier 2: Meaningful Acquaintances (20-100 people)
These are people you have real history with and could contact without awkwardness — but you are not in regular contact. Former classmates you liked but lost touch with, colleagues from previous roles, professors who knew your work, former mentors whose contact has faded, people from communities you are no longer active in.
You do not need to list every person individually. Cluster them: "Five colleagues from my 2024 summer internship," "Three professors from freshman year who knew my work," "Eight people I was close to in high school and am no longer in regular contact with." For each cluster, note the primary domain and approximately how many people are in it.
Tier 3: Weak Ties and Outer Ring (50-300+ people)
Everyone who knows who you are and whose contact would not be unexpected: LinkedIn connections who are not otherwise in your life, online community members who know your handle or have interacted with your posts, conference acquaintances, people who follow or read your work, friends of close friends you have met once or twice.
Do not try to name individuals. Describe clusters: "Approximately 80 LinkedIn connections from my academic field," "About 40 members of the [community name] Discord who know my username," "15 or so people I met at [event] and exchanged contact with but have not followed up with." For each cluster, note the domain and any specific high-value individuals who stand out within the cluster.
Step 2: Domain Audit
Create the following table and fill it in based on your mapping.
| Domain / Field / Community | Tier 1 Count | Tier 2 Count | Tier 3 Count | Depth Assessment |
|---|---|---|---|---|
| Your primary academic/professional field | Deep / Moderate / Shallow | |||
| Adjacent field 1 (related but distinct) | Deep / Moderate / Shallow | |||
| Adjacent field 2 | Deep / Moderate / Shallow | |||
| Completely different industry or domain | Deep / Moderate / Shallow | |||
| Creative or cultural communities | Deep / Moderate / Shallow | |||
| Geographic diversity (outside your city/region) | Deep / Moderate / Shallow | |||
| Age diversity (significantly older or younger than you) | Deep / Moderate / Shallow | |||
| Cross-sector (if you are in academia: industry contacts; if in industry: academic or nonprofit contacts) | Deep / Moderate / Shallow |
Assessment questions: - Which domains have strong representation across all three tiers? These are your well-developed network regions. - Which domains appear in only one tier, or not at all? These are your structural gaps. - What domains are most important to your current goals that are least represented? This gap is costing you the most opportunity right now.
Step 3: Structural Hole Analysis
For your network as mapped, identify the major clusters — groups of people who know each other. These clusters likely correspond to phases of your life (high school, college, first job), domains (professional community, hobby community, family community), or platforms (in-person community, online community).
Draw a rough diagram: each cluster as a circle, with you at the center or the intersections, and lines indicating whether the clusters are connected to each other or only through you.
Answer these questions in writing:
-
Which clusters in your network are connected to each other through other paths, not only through you? (These are closed network regions — high social support, lower informational advantage.)
-
Which clusters in your network are only connected to each other through you? (These are your brokerage positions — you are the structural hole bridge between them.)
-
Which clusters would benefit from being connected to each other, but currently are not? (These are potential brokerage plays — introductions you could facilitate that would create value for both sides while strengthening your own network position.)
-
Which clusters exist in your domain of interest that you are currently not connected to at all? (These are your most significant structural gaps.)
Step 4: Diversity Index
Rate your network across these four diversity dimensions on a scale of 1 (very homogeneous) to 5 (genuinely diverse):
Industry/Domain Diversity (1-5): ______
Do your connections span multiple industries and professional domains, or are they concentrated in one or two?
Evidence for your rating:
Age Diversity (1-5): ______
Do your connections include people significantly older and younger than you — mentors, peers, and people earlier in their journeys — or are they concentrated in your own cohort?
Evidence for your rating:
Geographic Diversity (1-5): ______
Are your connections located across different cities, regions, or countries, or are they predominantly local to your current context?
Evidence for your rating:
Perspective Diversity (1-5): ______
Do your connections represent genuinely different political, cultural, professional, and experiential backgrounds, or do they share a largely homogeneous worldview?
Evidence for your rating:
Diversity Total: ______ / 20
A score of 16-20 indicates a genuinely diverse network. A score below 12 suggests the network is informationally homogeneous in ways that are materially reducing your luck surface. Most honest assessments for people in their late teens and early twenties fall in the 8-13 range — not a failure, but a clear picture of where the work is.
Part 2: Gap Analysis
Based on the audit, identify your three most significant network gaps — the missing connection types that would most expand your luck surface relative to your specific goals.
For each gap, answer:
Gap 1:
Missing connection type: (e.g., "Industry practitioners in [field] — I have only academic connections")
Why this matters for my specific goals:
Where these connections are likely to be found:
One specific person or cluster I could target in the next 90 days:
Gap 2:
Missing connection type:
Why this matters for my specific goals:
Where these connections are likely to be found:
One specific person or cluster I could target in the next 90 days:
Gap 3:
Missing connection type:
Why this matters for my specific goals:
Where these connections are likely to be found:
One specific person or cluster I could target in the next 90 days:
Top 5 Weak Ties to Strengthen:
From your Tier 2 or Tier 3, identify five specific connections that represent high-value access to domains, information, or communities you want more of — and that you could realistically engage more actively in the next 90 days.
| Name / Identifier | Domain Access | Why High Value | Last Contact | First Step |
|---|---|---|---|---|
| 1. | ||||
| 2. | ||||
| 3. | ||||
| 4. | ||||
| 5. |
Top Structural Hole to Bridge:
Identify one pair of clusters in your network that currently have no connection to each other, that would benefit from knowing each other, and where you are uniquely positioned to facilitate the connection.
Cluster A: __
Cluster B: __
Why connecting them would be valuable to both:
One specific introduction that would begin to bridge this hole:
Part 3: The 90-Day Expansion Plan
The gap analysis tells you what is missing. The expansion plan is how you address it — specifically, sequenced, and tracked.
Month 1: Reconnection
The foundation of network expansion is not meeting new people. It is reactivating dormant relationships — people you already have history with, where the social cost of reconnection is low and the potential return is high. A reactivated strong tie brings you warm access to everyone they currently know.
Week 1-2: Dormant Tie Reactivation
Contact 5 people from your Tier 2 — former colleagues, professors, mentors, classmates you were genuinely close to — with a message that is brief, genuine, and non-transactional. The message should reference something specific from your shared history and ask a real question or share something genuinely relevant to their current work or interests. Do not ask for anything in the first contact. The goal is to reopen communication.
Template (adapt as needed): "Hi [Name] — I've been thinking about [specific shared experience or thing they taught you] recently and wanted to say it stuck with me. I'm now [brief current context]. Hope things are going well with [something specific you remember about them]."
Track each contact in your maintenance log (template provided below).
Week 3: Community Re-entry
Identify one community, event series, or organization that you were previously connected to but have drifted from — an alumni network, a professional association, a creative community, a local group. Re-enter it with genuine participation rather than passive membership. Show up twice before asking for anything.
Week 4: One Introduction Facilitated
Make one introduction between two people in your current network who would genuinely benefit from knowing each other and who are not currently connected. Send both a message that explains specifically why you think they should talk. This is a gift to both of them and a signal to both that you think in terms of what you can offer, not only what you can extract.
Month 1 Targets: - Dormant connections contacted: 5 - Genuine responses received: (track, do not control) - Community re-entered: 1 - Introductions made: 1
Month 2: Targeted Expansion
With the foundation of reactivated relationships, begin deliberately expanding into the gap areas you identified in Part 2.
Weeks 5-6: Enter One New Community
Join one new community relevant to a gap domain you identified — a professional association, an online forum, a club, a class, a meetup series. Entry is not passive membership. It means: showing up, participating genuinely in the community's primary activity, contributing something before asking for anything, and returning at least twice more in the following weeks.
The communities that generate the most serendipitous connections are usually those where participants are actively working on problems rather than networking explicitly. Conferences, workshops, collaborative projects, interest-based clubs, and skill-development groups consistently outperform explicit networking events in the research on how valuable connections actually form.
Weeks 5-8: Two Events Outside Your Usual Domain
Attend two events — lectures, workshops, conferences, meetups, shows, whatever is available in your context — that are genuinely outside your usual professional or academic territory. The goal is not to go with an agenda but to expose yourself to people and ideas from a different cluster. Document what happened, who you met, and whether anything unexpected emerged.
Weeks 7-8: Two Cross-Domain Connections
Make two genuine connections with people who work in or care about domains different from your primary one. These can emerge from the events above, from online communities, from introductions, or from deliberate outreach. A cross-domain connection counts when you have had a real conversation and exchanged contact information or followed each other's work.
Month 2 Targets: - New community entered: 1 - Events outside usual domain: 2 - Cross-domain connections made: 2 - New platform engagement established: (optional but recommended)
Month 3: Consolidation and Maintenance Architecture
Month 3 is not about adding more connections. It is about deepening the most promising new relationships from Months 1-2 and building the maintenance system that will keep the network alive beyond the 90 days.
Weeks 9-11: Deepen Three New Connections
From all the reconnections and new connections made in Months 1-2, identify three that show the most genuine mutual interest and potential for long-term value. Invest in these three with a more substantial exchange: a longer conversation, a genuine exchange of useful information, an introduction to someone in your network who could help them, or collaboration on something small.
Deep relationship building requires at least three meaningful touchpoints before a relationship is genuinely warm. If the connections from Month 1-2 have only had one or two, Month 3 is when you have the third.
Weeks 11-12: Facilitate Two More Introductions
Make two more introductions — ideally across clusters you have now connected into more deeply. Introductions are the most efficient high-leverage behavior in network building: they create value for two people simultaneously, cost you only a few minutes, and signal to both parties that you are someone who thinks about the network, not only your own position in it.
Week 12: Build the Maintenance System
Design a personal relationship management system that you will actually use. It does not need to be sophisticated. A spreadsheet with the right columns, maintained consistently, outperforms complex CRM software used sporadically.
Your maintenance system should include: name and primary domain, tier assignment, last contact date, next planned contact date, notes on what they are working on and what they care about, and what you have offered or could offer them.
Set a recurring calendar reminder — monthly is the minimum, bi-weekly is better — to spend 20-30 minutes on relationship maintenance: reviewing the log, sending two or three check-in messages, making one introduction.
Part 4: Maintenance System Design
A network that is built and then not maintained degrades rapidly. Research on dormant ties shows that a relationship's warmth decays measurably within six months of no contact for most people, and within a year for almost everyone. The maintenance system is what converts the 90-day expansion effort into a compounding long-term asset.
The Personal Relationship Log
Build a log with these fields for every meaningful connection (Tier 1 and Tier 2, and the highest-value Tier 3 contacts):
| Name | Domain | Tier | How Met | Last Contact | Next Contact | What They're Working On | What I Can Offer | Notes |
|---|---|---|---|---|---|---|---|---|
Review and update this log monthly. The discipline of updating "what they're working on" forces you to actually pay attention to your contacts' lives and work, which is the foundation of genuine relationship maintenance rather than performative check-ins.
The Monthly Check-In Rhythm
Set aside 20-30 minutes each month for relationship maintenance. In that time:
- Send two to three genuine check-in messages to contacts you have not been in touch with recently — something specific and non-transactional
- Make one introduction between people in your network who would benefit from knowing each other
- Identify anyone whose contact information or situation has changed that you should update in your log
This is a small investment. Over two years, it compounds dramatically. The person who does this consistently for two years has a fundamentally different relationship to their network than the person who invests intensively for 90 days and then lets it lapse.
The "Give Before You Ask" Contribution List
For each significant contact in your network, answer: what can I genuinely offer this person? The contributions that build the most network goodwill are:
- Relevant information (articles, reports, events they would find genuinely useful)
- Introductions (connecting them to someone in your network they should know)
- Feedback or perspective on their work (if they produce anything public)
- Endorsement or recognition of their work in relevant communities
- A direct referral or recommendation when the opportunity arises
Build this list before you need it. Network capital is built before it is spent. People who approach their network only when they need something find that the network is colder than expected, because the relationship has not been maintained with genuine contribution in between.
Optional Python Extension
For students with Python familiarity, the network_analysis.py module from Chapter 20 can be used to model your network structure quantitatively. The core exercises:
-
Encode your network as a graph. Each person is a node; each relationship is an edge. Weight edges by tier (strong tie = 3, meaningful acquaintance = 2, weak tie = 1).
-
Calculate your clustering coefficient. A high clustering coefficient means your network is highly interconnected — most of your contacts know each other. A low coefficient indicates more structural holes. Which do you have?
-
Experiment with adding "rewiring" connections. Add one cross-cluster edge to your model and recalculate average path length between all nodes. The Watts-Strogatz small-world experiments from Chapter 20 showed that a surprisingly small number of long-range connections dramatically reduces average path length across the whole network. Test this on your own graph.
-
Identify your highest-centrality nodes. Which contacts, if removed, would most fragment your network? These are your most structurally significant relationships — which may or may not be the ones you invest in most heavily.
This extension is not required, but it produces a qualitatively different kind of insight than the manual mapping — especially for students who find quantitative analysis more natural than visual or narrative approaches.
Templates and Worksheets
Relationship Maintenance Log
(Maintain this as a spreadsheet or running document; update monthly)
| Name | Primary Domain | Tier | How Met | Last Contact Date | Notes on Their Current Work | What I Can Offer | Next Contact Plan |
|---|---|---|---|---|---|---|---|
90-Day Action Tracker
| Month | Week | Action | Target | Completed (Y/N) | Notes on Outcome |
|---|---|---|---|---|---|
| 1 | 1-2 | Dormant tie outreach | 5 contacts | ||
| 1 | 3 | Community re-entry | 1 community, 2 appearances | ||
| 1 | 4 | Introduce two contacts | 1 introduction | ||
| 2 | 5-6 | Enter new community | 1 new community | ||
| 2 | 5-8 | Attend cross-domain events | 2 events | ||
| 2 | 7-8 | Cross-domain connections | 2 new connections | ||
| 3 | 9-11 | Deepen new connections | 3 deepened | ||
| 3 | 11-12 | Facilitate introductions | 2 more introductions | ||
| 3 | 12 | Build maintenance system | Log and calendar set up |
Network Gap Summary Table
| Gap | Domain Missing | Impact on Goals | Priority (High/Med/Low) | 90-Day Action |
|---|---|---|---|---|
| 1 | ||||
| 2 | ||||
| 3 |
Reflection Questions
Engage seriously with at least eight of these twelve questions in your final synthesis.
-
The mapping exercise reveals a network you have built implicitly, through circumstances, rather than one you designed. What does the implicit network reveal about the assumptions and patterns that have shaped your life so far?
-
Granovetter's weak-tie finding has been replicated many times. Does your own network map support or complicate it? Where do you see evidence for the weak-tie advantage in your own history of opportunities and information?
-
The structural hole analysis asks where you bridge otherwise disconnected clusters. Did you discover any brokerage positions you had not consciously recognized? What does occupying that position actually feel like in practice — do you experience the information advantage it is supposed to confer?
-
Network diversity is easy to endorse in principle and easy to avoid in practice, because homogeneous networks are comfortable. Where in your network audit did you find yourself most resistant to the honest picture? What does that resistance tell you?
-
Priya's story (see Character Connection below) illustrates the career cost of a network that is concentrated in one tier — mostly strong ties, few weak ties — and the rapid change that can happen when that structure shifts. Does your audit reveal a similar concentration? What has it been costing you?
-
The "give before you ask" principle is easy to articulate and genuinely uncomfortable for many people to practice, because it requires you to think about what you can offer before you know what you will get. What is on your "give" list? Is it longer or shorter than you expected?
-
The maintenance system design asks you to build a habit of consistent investment in relationships over time. What is the most realistic barrier to maintaining this system after the 90-day plan ends? How will you address that barrier before it becomes a lapse?
-
The ethics chapter (Chapter 39) argues that genuine network building — as opposed to transactional networking — requires that you be actually useful to the people you connect with, not just strategic about what you extract. As you designed your expansion plan, how much of it was oriented around what you can offer versus what you need? How would you adjust if the balance is off?
-
Which single contact in your entire network — in any tier — has the highest potential leverage for your current goals if the relationship were more active? What specifically is preventing you from investing in that relationship more?
-
The 90-day plan asks for specificity about targets, timelines, and methods. Which part of the plan felt most uncomfortable to commit to? What does that discomfort reveal?
-
After completing the map and the gap analysis, what is the most honest sentence you can write about the state of your network right now and what it is and is not positioned to generate for you?
-
Network expansion plans that are completed and then abandoned are common. What specific accountability structure — external to you — will you build around this plan to increase the probability that you actually execute it over 90 days?
Rubric for Self-Evaluation
Dimension 1: Audit Honesty and Completeness
Excellent: The network map reflects genuine effort to be accurate rather than impressive; tier assignments are honest (strong ties are not inflated, weak ties are not dismissed); the domain analysis reveals real gaps rather than a curated picture; the structural hole analysis is based on actual observation of network structure rather than what the student would like to believe.
Good: The map is generally accurate with minor optimism bias; tier assignments are roughly correct; domain analysis captures the major gaps; structural hole analysis is partially grounded in observation.
Developing: The map appears curated or optimistic; strong ties are significantly inflated; the domain analysis does not identify real gaps; the structural hole analysis is abstract rather than based on actual observation of the network.
Dimension 2: Gap Analysis Precision
Excellent: The three identified gaps are specific (not "I need more connections" but "I lack connections in [specific domain] who could [specific function]"), ranked by actual impact on current goals, with specific targets and routes identified for each.
Good: Gaps are identified with reasonable specificity; two of three have specific targets and routes; prioritization is explicit but may not be fully argued.
Developing: Gaps are described generically; targets are vague or absent; the gap analysis could apply to almost any person rather than specifically to this student's situation and goals.
Dimension 3: 90-Day Plan Specificity
Excellent: Each month's actions are concrete (specific people, specific communities, specific events); completion criteria are unambiguous; the sequencing logic — why reconnection before expansion before consolidation — is understood and applied.
Good: Most actions are specific; some may be vague; the sequencing is present but not always explicitly reasoned; completion criteria are mostly clear.
Developing: Actions are described as categories rather than specifics ("attend networking events," "reach out to weak ties"); no clear sequencing rationale; completion criteria are absent or subjective.
Dimension 4: Maintenance System Realism
Excellent: The maintenance system is designed for the student's actual context and habits — it is simple enough to sustain, specific enough to be actionable, and includes a calendar commitment already made; the "give" list is specific to individual contacts rather than generic.
Good: The maintenance system is sensible and largely realistic; the calendar commitment is planned but may not be made yet; the "give" list is present but partially generic.
Developing: The maintenance system is described in principle but not designed for the student's specific context; no calendar commitment; the "give" list is absent or entirely generic.
Dimension 5: Framework Application
Excellent: Weak-tie theory, structural holes, and network diversity are applied as analytical tools to specific features of the actual network map — not just mentioned as concepts. When Granovetter or Burt is invoked, it is to explain a specific feature of this specific network, not to demonstrate familiarity with the terminology.
Good: Frameworks are applied in the analysis and reflection sections with accurate usage; one or two instances where terminology appears more decorative than analytical.
Developing: Frameworks are mentioned in passing but not applied to specific features of the student's network; the analysis could have been written without the conceptual vocabulary of the book.
Character Connection: Priya's Full Network Arc
Priya started her job search six months before she needed a job, which sounds like good planning and was actually the only reason things worked out. She had a spreadsheet. She tracked every contact, every conversation, every application, every lead. She wanted to know what was working.
The spreadsheet told an uncomfortable story. Cold applications to job postings: she sent twenty-seven over three months, received three automated acknowledgments, had zero conversations that led anywhere. Referrals from strong ties — her three close friends in the field, her two college mentors she was still in contact with: these produced four conversations, one of which led to an informational interview that ultimately led to nothing concrete. And then there was everything else: the conversations that came through weak ties, through contacts two or three degrees removed from her existing network, through people she had met once at events or exchanged a few messages with online.
Every meaningful opportunity she eventually had traced back to that third category. Every one.
The job she took — the first real job, the one she was six months into by the end of the book — came through a chain she would not have predicted. A former classmate (Tier 2, someone she had worked on one group project with and had not spoken to in two years) had connected her to a colleague in a completely different industry who happened to mention an opening to a friend who was three degrees from Priya. The chain had four links. She knew only the first person. By the time the opportunity reached her it looked, from the outside, like luck.
Her spreadsheet told her it was not luck in the way most people mean that word. It was the consequence of having sent a genuine, non-transactional message to that former classmate two months earlier — a message reconnecting with her about a project the classmate had recently posted about, not asking for anything. That message reopened the channel. The rest followed from that.
The audit that Priya eventually conducted on her network — after she had the job, after she had time to think analytically about what had happened — revealed a pattern she recognized immediately. Her strong-tie network was dense and warm and almost completely concentrated in one cluster: a single academic program, her graduating cohort, a few professors. That cluster knew everything she knew. It could not surprise her. The opportunities that had actually mattered had come from outside it — from the edges of her Tier 2, from the outer ring, from people she barely knew.
She redesigned her network architecture around that finding. She started attending events outside her domain. She started making introductions for other people before she had any use for the goodwill. She set up a monthly maintenance reminder in her calendar. She kept the spreadsheet.
The lesson is not that Priya got lucky by accident and then explained it retrospectively. The lesson is that she built the architecture that made the luck possible — through a message she sent on a Tuesday evening to someone she barely knew, for no immediate reason, with no immediate expectation.
That is what this capstone is designed to build.
The audit you have just completed is a snapshot. It reflects the network as it exists today, built by choices made in the past, shaped by circumstances that were partly in your control and partly not. The 90-day plan is not an attempt to build the perfect network from scratch. It is an attempt to make a few high-leverage moves — to reactivate what has faded, to bridge what is disconnected, to enter one or two new territories — and to build the maintenance system that allows small, consistent investments to compound over the years into something that genuinely changes what is available to you.
The luck research is unambiguous: network structure is one of the highest-leverage variables you can actually influence. This is where the work is. Start with the dormant ties. The first message is always the hardest.