Browse Definitions :
Definition

G-code

G-code (also known as RS-274) is the name of the most prevalent programming language for computer numerical control (CNC) in computer-aided design and manufacturing (CAD/CAM).

G-code provides metric-based numeric control of CAM-controlled equipment such as CNC milling machines. The fine-grained control enabled by G-code and other CNC languages afford the precision for additive and reduction-based fabricating using many materials.

The code used in G-code and other CNC code tells the computer that controls the motors of the manufacturing equipment how far to move and at what speed. A mill has a spinning tip that carves a metal block, for example, into an intricately machined part. G-code can provide the instructions to the computer-controlled equipment to move the head through 3D maneuvers at differing speeds to create a camshaft, which, as an example, may be used to control valve timing in a gasoline-powered engine.

The first numerical computer control language was developed by MIT in the late 1950s. The earliest version of G-Code was standardized by the Electronic Industries Alliance in the early 1960s. Today, the exact, reproducible manufacturing afforded by G-code and similar languages is used in the creation of all kinds of military and scientific equipment and consumer goods.

This was last updated in December 2017

Continue Reading About G-code

SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close