Contact us today!

Network Solutions Unlimited Blog

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

What is Breadcrumb Navigation?
Breadcrumb navigation is more or less what the fairy tale would suggest it is: a path that leads back home (or in this case, the homepage). It is effectively an easier way to keep track of the path to and from a certain page (or area of an application) and is often displayed at the top of the viewed page. Each step provides a link that navigates back to the page in question.

So, let’s say that you were looking at a service page on some website. If the path to that page led from the homepage, to the second menu on the homepage, to the fifth menu item in that menu, the breadcrumbs would look something like this:

Home > [Menu 2] > [Menu Item 5]

Because these breadcrumbs serve as links, clicking on the [Menu 2] breadcrumb would bring you to that menu’s page, allowing you to continue browsing from there.

More Than Just Websites
You may also recognize this style of navigation from the toolbars of the folders and files saved to your system. This just makes it easier to find certain files again later and can be shared with another user if they need to know where a file is located.

Again, breadcrumbs are specifically meant to make navigation and organization easier for the user. Can you think of any other features that do the same? Leave your thoughts in the comments!

How Much Time Do You Spend Managing Vendors?
Is It Safe to Have Your Browser Remember Your Pass...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Windows 10 Gmail Mobile Device Management Training Employee Camera Computing Cache Smartphones Flexibility Outlook Internet Phishing Social Media eWaste Business Computing Personal Information Shadow IT Virtualization Evernote Wasting Time Value hacker Virus Sync Data Loss Licensing Cloud Experience Office 365 Sports Miscellaneous Email Entertainment Dark Web Saving Money Updates Files Firewall Productivity IT Services Education Bring Your Own Device Managed Service Provider Saving Time Going Green Android Specifications Network Security Security iOS Data Recovery Regulation Techology Ransomware The Internet of Things HIPAA Tech Support Samsung Cloud Computing Humor iPhone Rootkit Vendor Telephone Systems Upgrades Update Two Factor Authentication Applications Project Management BYOD Charger Information Technology Recovery Google User Error Customer Websites Windows 7 Microsoft Computers Google Maps Paperless Office Reputation Scam Assessment Public Computer Backup HBO IT Management Computer Accessories Tablets Smart Technology Language Business Intelligence Network Employer-Employee Relationship Wireless Technology Chrome VPN Worker Commute Shortcut Hacking Technology Vendor Management Automobile Microsoft Office Business Continuity Employee-Employer Relationship Patch Management Cost Management Antivirus IT Service Best Practices Business Owner Machine Learning Blockchain Hard Drives App Memory Physical Security Money Black Market Emails Microsoft Excel Gifts Management Social Engineering Workers Scalability NFL Tech Term Data Storage Touchpad Windows 10s Storage Analysis Downtime Computing Infrastructure Comparison Vulnerability Communication FAQ Save Time Colocation Remote Computing Audiobook User Tips Hybrid Cloud Data storage Proactive Financial Redundancy Passwords Managed IT Services Safety Conferencing Streaming Media Monitoring Health Artificial Intelligence Computer Marketing Books PDF Robot Cortana Hiring/Firing Virtual Assistant Software Cybersecurity Hosted Solutions Financial Technology Computer Forensics Spyware Legal Software as a Service Internet Exlporer Security Cameras Laptop WPA3 Remote Monitoring Google Drive Business Managing Stress Malware How To Mobile Security Wireless Internet Managed Service Hackers Outsourced IT E-Commerce Meetings Apple Wi-Fi Holiday File Sharing Edge Hard Drive App store Managed IT Human Resources Mobile Devices Legislation Device Security Unified Communications Accessory Spam Professional Services Augmented Reality Content Hyperlink End of Support Managed IT Service HaaS Internet exploMicrosoft Office Tips Video Games Audit Data Theft Smart Tech Managed IT Services History Government Efficiency Credit Cards IT Support Display Phone System Sales Solid State Drive SaaS Internet of Things Administration Identity Theft Alexa for Business Upgrade OneNote Collaboration Cast Cybercrime Operating System Transportation Disaster Recovery Data Backup PowerPoint Co-Managed Services Remote Workers Budget Browser IT budget Chromebook Unsupported Software Troubleshooting Avoiding Downtime Best Practice Small Business Facebook Unified Threat Management Telephone Consultant Privacy SMB MSP Maintenance Word IoT Thank You Quick Tips Tip of the Week Spam Blocking Productivity Innovation Devices How to Information Fraud Payment Cards Data Privacy Utility Computing Students Hosted Solution Excel Relocation Backup and Disaster Recovery Company Culture Advertising Bluetooth Root Cause Analysis Mobile Hardware Twitter Access Control Electronic Medical Records Save Money Password Congratulations Business Technology Data Management Users IT Solutions Politics Cleaning Office Windows 10 Loyalty Risk Management Keyboard Shortcuts Lifestyle USB Virtual Reality Admin Two-factor Authentication Google Assistant Testing Amazon Apps Webinar Application Mobile Device File Storage Computer Fan Google Docs Screen Mirroring IT solutions Router Gamification Instant Messaging Ciminal Wireless Charging Travel Television Proactive IT Data Security Touchscreen Peripheral Battery Chromecast Windows Smartphone Data Breach Connectivity Networking Search CrashOverride Benefits Printers Printing Keyboard Adobe Server Retail Nanotechnology Data Emergency VoIP WannaCry Alert Private Cloud Work/Life Balance Communications Settings WiFi Computer Care Commerce Monitor Bandwidth Content Filtering Payroll Law Enforcement intranet Big Data Identities Gadgets Workplace Tips Identity Wasting Money Employer Employee Relationship Projects BDR Microsoft Word Content Filter Worker Wireless Compliance Public Cloud Windows Ink Document Management IT Support Hard Disk Drive Automation Mobility Virtual Private Network Business Management Encryption WIndows Server 2008 Monitors Data Protection