Browse Definitions :
Definition

G-code

Contributor(s): Matthew Haughn

G-code (also known as RS-274) is the name of the most prevalent programming language for computer numerical control (CNC) in computer-aided design and manufacturing (CAD/CAM).

G-code provides metric-based numeric control of CAM-controlled equipment such as CNC milling machines. The fine-grained control enabled by G-code and other CNC languages afford the precision for additive and reduction-based fabricating using many materials.

The code used in G-code and other CNC code tells the computer that controls the motors of the manufacturing equipment how far to move and at what speed. A mill has a spinning tip that carves a metal block, for example, into an intricately machined part. G-code can provide the instructions to the computer-controlled equipment to move the head through 3D maneuvers at differing speeds to create a camshaft, which, as an example, may be used to control valve timing in a gasoline-powered engine.

The first numerical computer control language was developed by MIT in the late 1950s. The earliest version of G-Code was standardized by the Electronic Industries Alliance in the early 1960s. Today, the exact, reproducible manufacturing afforded by G-code and similar languages is used in the creation of all kinds of military and scientific equipment and consumer goods.

This was last updated in December 2017

Continue Reading About G-code

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close