XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

What is Breadcrumb Navigation?
As per the aforementioned fairy tale, breadcrumb navigation consists of a path leading home. In this case, home is the homepage. With breadcrumb navigation, you can more easily keep track of how you got to the current web page you’re on, as well as the path back to the home page. This path can typically be viewed at the top of the page. Each step includes a link that navigates back to a specific page.

Let’s say that you’re looking at a service page on a website. If the path you took leads back to the home page, you’ll see all of the pages in between in the breadcrumbs menu. For the sake of this example, let’s say the pages in between are the second menu item and the fifth menu item. It would look something like this:

Home > [Menu 2] > [Menu Item 5]

Since these breadcrumbs are links, you can click on any one of them to be brought back to that page. This lets you continue browsing with minimal chance of getting lost on the site trying to backtrack.

More Than Just Websites
You might notice that this navigation style is similar to the ones used in toolbars in file folders or files saved on your desktop. The reason is the same--it makes finding certain files easier at a later date. The location can also be shared with others who need to know where it is.

Breadcrumbs are typically meant for helping users with browsing and organization. Are there any other features out there you can think of that do the same thing? Let us know in the comments.

The Right Data Recovery Strategy Is Important to P...
Can You Afford to Ditch Your Telephone System for ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Hosted Solutions Hackers Data Small Business Hardware Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Efficiency Network Security Innovation IT Support Social Media Business Management Business IT Services Business Continuity Server Smartphones Miscellaneous Upgrade Virtualization Communication Windows Disaster Recovery User Tips Data Backup Computer Communications Microsoft Office Managed IT Services Users Data Recovery Mobile Device Management Passwords Browser Smartphone Android Marketing WiFi Holiday Save Money Alert Ransomware Outsourced IT Mobile Computing Vendor Management BDR Tech Term Cybercrime Windows 10 Internet of Things Operating System Chrome Remote Monitoring Cloud Computing Apple BYOD Information Technology Computers Avoiding Downtime Bring Your Own Device Firewall Router Going Green Spam Current Events Big Data History VPN Best Practice Remote Computing Managed IT Services IT Solutions Telephone Systems Cybersecurity The Internet of Things Automation Artificial Intelligence Facebook IT Consultant Employer-Employee Relationship Health Application Collaboration Hacking Trending Phone System Social Engineering Wireless Technology Printer Office Money Budget Proactive IT Excel Bandwidth App Lithium-ion Battery Office 365 Productivity Applications Business Managament Windows 10 Two-factor Authentication Mobility Unified Threat Management Fax Server Business Intelligence IT Support Recovery Maintenance Windows 8 iPhone Mouse How To Networking Content Filtering Gmail Encryption Sports Value Humor Mobile Device Outlook Apps Tutorials Information Phishing Virus PowerPoint Google Drive Antivirus Data Protection Blockchain Managed IT Word Analytics Customer Relationship Management Training Hard Drives Data Security Private Cloud Website Redundancy User Error Law Enforcement Flexibility IT Management Search Entertainment Tablet Servers Administration Twitter Digital Payment Document Management Settings Social Networking Retail Computer Repair Streaming Media Risk Management Human Resources Software as a Service Analysis Managed Service Network Congestion Vulnerability Saving Time Administrator Connectivity Tech Support Downtime Save Time Scam Identity Theft File Sharing Memory Inbound Marketing Office Tips Voice over Internet Protocol Conferencing Data Management Compliance Touchscreen Solid State Drive Data loss Samsung Access Control Black Market Smart Tech Spam Blocking Instant Messaging CES Online Currency Fraud Environment Cleaning Password Recycling Machine Learning IT Plan Wireless Physical Security Point of Sale Public Cloud Education Video Surveillance Statistics Biometrics Webinar Content Management SaaS Infrastructure IT service Unsupported Software Piracy Help Desk Programming Paperless Office OneNote IBM Data storage Skype Hacker Leadership Update Internet Exlporer Augmented Reality Intranet Data Storage eWaste Running Cable Telephony Computer Accessories PDF Wearable Technology Comparison Keyboard Robot Google Docs Safety Wi-Fi Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support YouTube Government Social Meetings Best Available Workers Bluetooth Telephone System Credit Cards DDoS People Mobile Cortana Uninterrupted Power Supply Electronic Health Records Millennials Customers Line of Business Upgrades Analyitcs Advertising Wire Microchip FENG Customer Service Multi-Factor Security Strategy Knowledge Wireless Charging Content Filter Camera Patch Management Chromecast Cryptocurrency Consultant Frequently Asked Questions Distributed Denial of Service Files Professional Services Google Apps Screen Mirroring Workforce Authentication MSP 360 Emails Fiber-Optic Notifications IT Security Smart Office Electronic Medical Records Cameras Lifestyle Insurance Flash Print Server Storage Windows 10s Laptop Safe Mode Business Owner Licensing Tip of the week Amazon Colocation Virtual Reality Tools Shadow IT Remote Support HVAC Charger Cast WIndows 7 Webcam Telecommuting SharePoint nternet Crowdfunding Nanotechnology Remote Worker Sync Cables Hybrid Cloud Search Engine Hiring/Firing Printer Server Shortcut Practices HIPAA Law Firm IT Addiction Virtual Private Network Worker Commute Touchpad Company Culture Accountants Business Technology User Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Bloatware PC Care Password Manager Legal Enterprise Content Management Computer Care Managing Stress Domains Software Tips Remote Work Relocation Wiring Hosted Solution 3D Unified Communications Students Bing Scheduling Monitor LinkedIn Hosted Computing Proactive Science Cache Project Management Audit Staff Net Neutrality eBay Online Shopping Netflix Entrepreneur Botnet Alerts Business Mangement Windows 8.1 Update Password Management Devices GDPR Start Menu Theft Display Healthcare Shortcuts Root Cause Analysis Data Warehousing Specifications Macro Reputation Inventory Remote Monitoring and Maintenance Tablets Internet exploMicrosoft Debate Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop Co-managed IT Digital Signature IoT Supercomputer Hiring/Firing Regulations Text Messaging Evernote E-Commerce Cost Management Travel Work Station Criminal NarrowBand NIST Gaming Console HBO Thought Leadership eCommerce Worker Music Regulation Audiobook Scalability Assessment Rootkit Utility Computing Politics Printers Transportation How to Television Techology Troubleshooting Webinar Benefits Automobile Public Computer Thank You IT solutions Employer Employee Relationship CrashOverride Smart Technology Congratulations Books Loyalty Experience Two Factor Authentication Battery Content Emergency Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *