Identification should include factors such as
budget restrictions
requirements (e.g., for storage or software/applications, for multimedia tasks, for gaming)
intended use (e.g., business vs. personal).