I manage one of the 1010s bigger brothers and can answer some questions.
I'm speaking in general product family terms and haven't verified that everything pertains to the 1010. Still, this will give you an idea of what to check for.
Device management--depends on the codebase. You can run Firepower in classic ASA OS, or FTD. If you run FTD, you have CDO (cloud managed), FMC (dedicated management host), and FDM (onboard device manager). You will likely either run the 1010 in ASA mode or use FTD w/ FDM. FDM is the management GUI--you lose the random crashes of ASDM and some of the features, but it works for the most part. I come from an ASA CLI background and many of the troubleshooting commands still work, but they're now within the read-only diagnostic CLI. FDM is fine for small biz use but it's too clunky for heavy lifting.
VPN user cap--the ASA model is that your IPsec VPNs, clientless VPNs, and client-based VPNs (AnyConnect) pull from the same pool. You don't need an AnyConnect license if you won't use it. The ASA 5505 came with 2 free AnyConnect licenses in the 3.X days, but I'm not sure how FirePower does it. If you want to use AnyConnect, you need to acquire a user license. You're looking at Smart Account account setup, registering an Anyconnect PAK, and converting it to a smart license. You're going to be almost halfway there anyway just to get the firewall out of eval mode, but there is significantly more hassle with Firepower than the PIX/ASA PAK classic licensing.
IPS functionality--it's something we're building to in our deployment, but I don't think Firepower allows you to run an IPS module like the pre-FTD 5500-X series did. If so, FMC may become a hard requirement. Unfortunately, the bad guys have heard of HTTPS too, and without SSL inspection IPS is limited. I would not recommend a home user set up FMC and pay for a TMC license.
Support contracts--which one you get is dependent on your code base, but CON-SNT-FPR1010N is $99/yr on CDW.