At this point in the book, it becomes increasing difficult to avoid discussion of the various device attributes. This being the case, it would seem like a good idea to define what they are, who accesses them, and why.