Cerebrospinal fluid (CSF) flow in the brain ventricles is critical for brain development. Altered CSF flow dynamics have been implicated in congenital hydrocephalus (CH) characterized by the potentially lethal expansion of cerebral ventricles if not treated. CH is the most common neurosurgical indication in children effecting 1 per 1000 infants. Current treatment modalities are limited to antiquated brain surgery techniques, mostly because of our poor understanding of the CH pathophysiology. We lack model systems where the interplay between ependymal cilia, embryonic CSF flow dynamics and brain development can be analyzed in depth. This is in part due to the poor accessibility of the vertebrate ventricular system to
in vivo
investigation. Here, we show that the genetically tractable frog
Xenopus tropicalis
, paired with optical coherence tomography imaging, provides new insights into CSF flow dynamics and role of ciliary dysfunction in hydrocephalus pathogenesis. We can visualize CSF flow within the multi-chambered ventricular system and detect multiple distinct polarized CSF flow fields. Using CRISPR/Cas9 gene editing, we modeled human L1CAM and CRB2 mediated aqueductal stenosis. We propose that our high-throughput platform can prove invaluable for testing candidate human CH genes to understand CH pathophysiology.
Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are configured securely, we actively scan the IPv4 address space for publicly reachable OPC UA systems and assess the security of their configurations. We observe problematic security configurations such as missing access control (on 24% of hosts), disabled security functionality (24%), or use of deprecated cryptographic primitives (25%) on in total 92% of the reachable deployments. Furthermore, we discover several hundred devices in multiple autonomous systems sharing the same security certificate, opening the door for impersonation attacks. Overall, in this paper, we highlight commonly found security misconfigurations and underline the importance of appropriate configuration for security-featuring protocols.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.