Contact us today!

Network Solutions Unlimited Blog

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

What is Breadcrumb Navigation?
Breadcrumb navigation is more or less what the fairy tale would suggest it is: a path that leads back home (or in this case, the homepage). It is effectively an easier way to keep track of the path to and from a certain page (or area of an application) and is often displayed at the top of the viewed page. Each step provides a link that navigates back to the page in question.

So, let’s say that you were looking at a service page on some website. If the path to that page led from the homepage, to the second menu on the homepage, to the fifth menu item in that menu, the breadcrumbs would look something like this:

Home > [Menu 2] > [Menu Item 5]

Because these breadcrumbs serve as links, clicking on the [Menu 2] breadcrumb would bring you to that menu’s page, allowing you to continue browsing from there.

More Than Just Websites
You may also recognize this style of navigation from the toolbars of the folders and files saved to your system. This just makes it easier to find certain files again later and can be shared with another user if they need to know where a file is located.

Again, breadcrumbs are specifically meant to make navigation and organization easier for the user. Can you think of any other features that do the same? Leave your thoughts in the comments!

How Much Time Do You Spend Managing Vendors?
Is It Safe to Have Your Browser Remember Your Pass...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Instant Messaging Adobe Employee-Employer Relationship Unified Threat Management WiFi Storage Financial Printers Redundancy Managed IT WIndows Server 2008 Touchpad Black Market Antivirus Consultant Robot Thank You Managed Service Provider Malware Innovation Risk Management eWaste Reputation Colocation Google Maps Tablets Collaboration Data Privacy IT Support Conferencing Rootkit Licensing Internet exploMicrosoft Save Money HIPAA Audiobook Cloud Remote Monitoring Safety End of Support Computing Infrastructure Data Managed IT Service Computer Forensics WPA3 Ciminal Management Webinar Privacy Users Tip of the Week Marketing Bluetooth Electronic Medical Records Google Employer Employee Relationship Best Practice Network Security OneNote Troubleshooting Amazon Mobile Devices Money Emails Law Enforcement Legal Smartphone Telephone Systems Maintenance Workplace Tips IoT Customer Apps Identity Theft Content Filter Financial Technology NFL Edge Google Assistant IT solutions Spam Blocking IT Services Mobility Books Worker Commute Disaster Recovery Display Samsung Content Filtering HBO Automation Connectivity CrashOverride Passwords Language Scam Proactive Experience Microsoft Excel Gamification Virtual Reality Wireless Technology Travel Managed Service Hybrid Cloud Automobile Computing IT Solutions Update Communication Business Continuity Training Cloud Computing Video Games Vendor Management Google Docs Techology File Storage Chromebook Virtual Assistant Entertainment Productivity Battery How to Smart Technology Business Owner Two-factor Authentication Nanotechnology Monitors Google Drive Windows 10 Business Technology Cache Phone System Shortcut Internet Data Protection Outsourced IT Wireless Internet History Data Backup Data Breach Upgrade Business Intelligence Augmented Reality Server Data Recovery Two Factor Authentication Evernote Cortana Cleaning Benefits Windows 7 Identities Comparison Office Tips Microsoft Tech Term Managing Stress Computers Devices Sports WannaCry Firewall Charger Sales Word Big Data Hiring/Firing Unified Communications Shadow IT Productivity Gadgets Hardware Hosted Solutions Business Management Mobile Device Management Professional Services Peripheral Virus Public Cloud File Sharing Save Time FAQ Audit Private Cloud Computer Accessories Cost Management Wasting Money Legislation Efficiency Specifications User Error Smartphones Chrome SaaS Managed IT Services MSP Going Green Smart Tech Politics Holiday VPN Emergency Hard Drive Humor Windows Ink Identity Wasting Time Avoiding Downtime Scalability Applications Best Practices Browser Hosted Solution Vulnerability Unsupported Software Commerce Information Proactive IT Communications Meetings Small Business Personal Information Settings Windows Root Cause Analysis Social Media Device Security Social Engineering Solid State Drive Relocation Windows 10s Compliance Data Loss Work/Life Balance Camera Upgrades iOS IT budget Operating System Wireless Charging Sync Computer Fan Health Hard Drives Information Technology Assessment Hacking Miscellaneous Network Networking Transportation Managed IT Services Content Worker Recovery Credit Cards Computer Care Vendor Wireless Streaming Media Artificial Intelligence The Internet of Things Data Security Data Management Password Screen Mirroring Tech Support Security Memory Virtualization Cast Software as a Service Advertising Document Management Hard Disk Drive Budget Fraud App store Education PDF Office Websites Spyware Mobile Security Co-Managed Services BDR HaaS Updates Accessory Search PowerPoint Projects Public Computer Mobile Bring Your Own Device Files Cybercrime Internet Exlporer Project Management Email Hyperlink intranet Bandwidth BYOD Monitor Alert Keyboard hacker iPhone IT Management Ransomware Administration Encryption Data storage Router Microsoft Word Technology Business Computing Analysis Physical Security Outlook Government Wi-Fi Telephone Cybersecurity Apple App Company Culture Spam Workers Chromecast Twitter Business Testing How To Congratulations Lifestyle Alexa for Business Application Television Blockchain Downtime Dark Web User Tips Mobile Device Facebook Internet of Things Android Excel Loyalty Touchscreen Monitoring Data Storage Windows 10 Employer-Employee Relationship VoIP Hackers Patch Management Microsoft Office USB Students Flexibility Printing Computer Gmail Saving Money Value Office 365 Retail Data Theft Software Quick Tips Laptop Gifts Regulation Phishing Backup IT Support Remote Computing