Latest news with #SouthAfricanBureauofStandards


Fibre2Fashion
27-05-2025
- Business
- Fibre2Fashion
Smart Sizing and Virtual Prototyping: Transforming the Apparel Industry
Garment sizing, prototyping, and fitting have undergone a transformative shift, driven by advancements in computer-aided design, 3D body scanning, and virtual reality interfaces. This evolution not only enhances consumer satisfaction but also significantly impacts manufacturers and retailers, reshaping the clothing industry by addressing long-standing challenges related to size and fit. Traditional Practices and Emerging Challenges Historically, garment development evolved from bespoke tailoring to ready-to-wear (RTW) systems, relying heavily on proportional rules and manual measurements. Tailors possessed deep anatomical knowledge and crafted patterns tailored to individual clients. However, the rise of mass production introduced standard sizing systems that often fail to accommodate the diversity of human body shapes, frequently resulting in consumer dissatisfaction. Despite the economic advantages of RTW, it falls short in delivering a personalised fit, primarily because current sizing methods are not grounded in real anthropometric data. This leads to garments that may suit certain demographics but overlook large segments of the population with unique body forms. Moreover, fits and sizes vary globally. For example, most manufacturers in India adopt European and American sizing systems which do not fit properly. However, for companies engaged in international business, understanding the sizing requirements of other nations has become increasingly important. Sizing systems serve as communication tools for consumers, providing guidance on body types, garment sizes, and fits. For example, ISO/TC 133 is a clothing sizing system developed by the South African Bureau of Standards (SABS). Most national sizing systems determine figure types based on body measurements such as height, bust, hip, and waist, as well as body development and age. Countries like Germany, Austria, Japan, Hungary, and South Korea have also developed their own distinct sizing systems. The Role of 3D Body Scanning Technology One of the most groundbreaking developments in garment design is 3D body scanning. This technology captures detailed digital representations of the human form, enabling precise measurements, posture analysis, and the creation of realistic avatars. Unlike traditional methods that rely on one-dimensional linear measurements, 3D scanning provides comprehensive data on shape, volume, and posture—revolutionising how garments are prototyped and assessed. Several studies highlight how body scanning facilitates population-wide anthropometric data collection, leading to a better understanding of size diversity. Additionally, it supports the standardisation of posture during measurement, enabling comparisons across scanning systems and alignment with historic measurement techniques. However, a key limitation is the use of static posture during scanning, which may not accurately reflect dynamic body forms and movements experienced in real life. Re-evaluation of Pattern Construction and Sizing With access to comprehensive 3D body data, traditional methods of pattern drafting need to be re-evaluated. Rather than relying on proportional formulas, designers can now create patterns based on actual body forms, significantly enhancing fit accuracy. This shift calls for the integration of engineering principles into fashion design—for example, using ergonomics to improve the comfort and functionality of garments. New classification systems for body types challenge the limitations of conventional proportion-based theories, allowing for better representation of diverse body shapes in clothing design and paving the way for truly inclusive fashion. Virtual Prototyping and Try-On Interfaces Virtual prototyping tools enable garments to be tested on digital avatars before physical production, reducing development time and costs. These systems simulate fabric drape, fit, and appearance, providing invaluable insights during the design phase. Software such as Browzwear (VStitcher), OptiTex, CLO 3D, TUKA3D, and Lectra offer 2D and 3D CAD systems for pattern making, prototyping, fabric simulation, and visualisation on virtual models. They allow designers to test fit and drape and create realistic 3D garments. CLO 3D, for instance, creates real garments in real time and provides fast, accurate visualisation of fabric, fit, and silhouette. It shortens time-to-market through virtual sampling and remote collaboration, while promoting sustainability by reducing the need for physical samples, shipments, and material waste. In omni-channel retail, online virtual fitting rooms allow consumers to visualise fit based on their measurements using customisable avatars. Augmented reality (AR) and virtual reality (VR) retail platforms combine size prediction, avatar personalisation, and social feedback mechanisms to enhance the online shopping experience. These interfaces offer personalised recommendations, reduce return rates, and enable real-time interaction with virtual garments. Consumer Expectations and Industry Responses Despite technological progress, consumers continue to report dissatisfaction with garment fit. This disconnects stems from the difference between how professionals use anthropometric data and garment construction techniques (such as ease, line, balance, grain, and size), and how consumers assess fit based on personal comfort and aesthetics. These gaps can be addressed by integrating data from virtual interfaces, consumer feedback, and demographic insights to develop standardised fit assessment tools. Mass Customisation and Future Outlook Mass customisation presents a promising middle ground between bespoke tailoring and RTW. By leveraging 3D scan data and adaptable manufacturing techniques, brands can offer semi-tailored garments that accommodate individual measurements. This model honours consumer uniqueness while retaining the efficiencies of mass production.

IOL News
01-05-2025
- Business
- IOL News
Cybersecurity: how the Cell C and SABS attacks could have been prevented
Two recent, high-profile cyberattacks—one on mobile telecommunications provider Cell C and another on the South African Bureau of Standards (SABS)—have rocked South Africa. Image: Independent Newspapers Cybercrime has become the single biggest threat to businesses worldwide. According to the Allianz Risk Barometer 2025, cyber incidents — including ransomware attacks, data breaches and IT outages — are now the top global business risk, marking their fourth year at the top. A decade ago, only 12% of global respondents cited cyber as a major concern. In 2025, that number surged to 38%. Allianz noted, 'Cyber is the top risk across North and South America, Europe, and Africa,' dominating industry concerns from aviation to legal services. More importantly, it now ranks as the number one risk in South Africa, overtaking long-standing issues like load shedding and political instability. This concern is not just theoretical. Two recent, high-profile cyberattacks—one on mobile telecommunications provider Cell C and another on the South African Bureau of Standards (SABS)—have rocked South Africa. Both incidents have raised serious questions about compliance, cybersecurity readiness, and whether these attacks could have been prevented. Cell C confirmed in a December 2024 media release that it had suffered a major ransomware attack. Sensitive unstructured customer data — including ID numbers, bank details, driver's licenses, medical records and passport information — was compromised and later leaked on the dark web. Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration -:- Loaded : 0% Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 0:00 This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Background Color Black White Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Transparent Window Color Black White Red Green Blue Yellow Magenta Cyan Transparency Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Dropshadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. Advertisement Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration -:- Loaded : 0% Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 0:00 This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Background Color Black White Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Transparent Window Color Black White Red Green Blue Yellow Magenta Cyan Transparency Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Dropshadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. Next Stay Close ✕ While a follow-up communication was sent to customers in early January 2025, the eight-day delay between public disclosure and customer notification drew criticism. The SABS breach followed a similar pattern — ransomware paralysed the organisation's systems in November 2024, with clients being informed on 26 November. Shockingly, it was later revealed in Parliament that, by February 2025, core systems remained encrypted and inaccessible. This marked the third cyberattack on the SABS in just five years. Herman Stroop, Lead ISO Specialist at WWISE (World Wide Industrial & Systems Engineers), said that both attacks were entirely preventable. 'Neither Cell C nor SABS were ISO/IEC 27001 certified — a globally recognised standard for information security management,' Stroop said. 'This standard isn't just a technical checklist. It's a framework that forces an organisation to understand its vulnerabilities, assess its risks, and apply controls that address these risks in a structured, auditable way,' Stroop added. The ISO/IEC 27001 standard focuses on Confidentiality, Integrity, and Availability (CIA)—the foundation of modern information security. It requires organisations to conduct ongoing risk assessments, implement policies and technical controls, and continuously monitor and update these defences in response to emerging threats. According to Stroop, the absence of such a system is often due to a lack of strategic commitment from leadership. 'Cybersecurity is wrongly seen as an IT issue,' he says. 'Top management often fails to view it as a core business risk, resulting in underinvestment in preventative frameworks like ISO/IEC 27001. One key challenge in South Africa is poor enforcement of existing regulations. While the Protection of Personal Information Act (POPIA) and Minimum Information Security Standards (MISS) lay out clear expectations for information governance, many organisations either ignore or delay compliance due to a perceived lack of consequences," Stroop said. 'The irony is that prevention is far cheaper than remediation,' Stroop noted. 'In many cases, organisations suffer reputational damage, legal liability, and operational downtime that far exceed the cost of implementing an ISO-compliant Information Security Management System.' Cell C and SABS also provide examples of poor transparency. Details about the nature of the attacks and how they were handled remain vague. 'When an organisation isn't ISO-certified, it usually doesn't have the documentation, procedures or incident response plans to respond properly — let alone communicate clearly — during a breach,' Stroop added. According to the Information Regulator, South Africa sees between 150 and 300 cyberattacks reported each month—and that's just the reported incidents. Many go unreported due to reputational fears or because organisations are not compliant with POPIA and fear investigation. Stroop believes that ISO 27001 should be mandated for public institutions and critical infrastructure operators. 'Without minimum compliance levels, we're just waiting for the next disaster,' he says. 'It's not a matter of if, but when.' And there is movement. Some insurance providers are beginning to offer premium reductions for ISO-certified organisations, while major corporate clients now demand ISO 27001 certification from vendors. 'It's becoming a market differentiator,' Stroop concludes. 'Organisations serious about protecting their data and reputation cannot afford to ignore ISO 27001 any longer.' In a digital age where the threat landscape evolves daily, being unprepared is no longer an option. BUSINESS REPORT


The Citizen
25-04-2025
- Automotive
- The Citizen
Concrete maestro joins fight against potholes in Heidelberg
Johann Moolman, a retired concrete technologist and former South African Bureau of Standards (SABS) expert, is using his skills alongside the Heidelberg Hope NPC team to help restore the town's roads. Moolman explained the process of fixing potholes. 'We can only repair potholes in the streets of the town. Any national road with an R or an N and a number in its name is a provincial or national road, and the provincial municipality or the South African National Road Agency must repair the potholes on those roads,' he said. He explained the process and said they could fix a pothole only once the road was dry. The recent heavy rains in Heidelberg contributed to the size and frequency of potholes, impacting the repair operations. The process: • The pothole is first cleaned of loose material, water and dirt to help create a solid base for the repair. • The edges of the pothole are cut to create a neat, straight shape to ensure the new material can better adhere to the existing road surface. • A mix of hot or cold asphalt is put in the pothole. Hot asphalt is often preferable for a lengthier, more durable repair. • The asphalt is compacted with a roller or tamper to ensure it is firm and level with the rest of the road. • The surface is smoothed and sealed to prevent water seepage from weakening the repair. A rapid response is necessary to effectively manage and control potholes, particularly during the rainy season when large potholes can form overnight. The Lesedi Local Municipality (LLM) works closely with the Heidelberg Hope team. However, residents must report potholes on the My Lesedi App. 'The LLM and Heidelberg Hope have a good working relationship, and pothole complaints are given to Heidelberg Hope,' said Nicolene Neveling, the Heidelberg Hope spokesperson. 'Between the LLM and Heidelberg Hope, we are doing our best to get to every pothole but prioritise those on the busier streets in town,' Neveling added. She encouraged businesses and residents to get involved or help provide the repair materials. For more information, call Neveling on 072 840 0205. At Caxton, we employ humans to generate daily fresh news, not AI intervention. Happy reading!


Zawya
06-03-2025
- Business
- Zawya
South Africa: New standards pave way for renewable energy breakthrough
The South African Bureau of Standards (SABS) has quietly released three pivotal documents that promise to be more than just technical paperwork. These standards target critical challenges in the nation's energy sector, focusing on microgrids, off-grid systems, and communication networks for power utility automation, and could transform rural electrification and renewable energy development. The most exciting standard, SATS 62257-9-2, zeroes in on microgrids – localised energy systems that can operate independently or alongside the main grid. This is a lifeline for rural communities struggling with energy access. By providing clear guidelines for designing and implementing these microgrids, the standard reduces risks for developers and opens up new possibilities for decentralised energy solutions. Democratising access Another key document, SATS 62257-100, serves as a comprehensive roadmap for off-grid electrification. It democratises access to international best practices, making it easier for both developing and developed countries to navigate the complex world of renewable energy deployment. The third standard, SANS 61850-8-1, might seem deeply technical, but it's equally crucial. It addresses the communication infrastructure needed for modern, automated power systems, essentially laying the groundwork for smarter, more efficient grids that can integrate renewable energy sources seamlessly. Lighting the way to electrification These standards represent a strategic approach to solving South Africa's energy challenges, increasing investor confidence and accelerating project development. They could also position South Africa as a regional leader in renewable energy innovation, strengthen public-private partnerships, create green jobs, and enhance local expertise. For businesses in the renewable energy sector, these standards represent a clear signal that South Africa is serious about building a sustainable, resilient energy infrastructure that can power economic growth and improve quality of life for millions. All rights reserved. © 2022. Provided by SyndiGate Media Inc. (