§Network
management of unknown and untrusted entities
§Security
(users get root on nodes!)
§Scheduling
of experiments
§Calibration,
validation, and scaling
§Artifact
detection and control
§NP-hard
virtual --> physical mapping problem
§Providing
a reasonable user interface
§….