For example, the establish activity may include identifying the various applications that will run on the computer system, collecting information on the protocols, network, security, and other facilities that form the operational backbone of the computer system, etc.