The document discusses two key challenges for pervasive computing systems: capturing user intent and enabling cyber foraging. For user intent, the document questions how systems can infer a user's goals in order to better support adaptation and proactivity. For cyber foraging, it proposes augmenting mobile devices' resources by exploiting nearby wired infrastructure through techniques like offloading computations or caching data. Several open research questions are also raised regarding discovering available surrogates, establishing trust, handling load balancing, and supporting seamless surrogate access.