XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

What is Breadcrumb Navigation?
As per the aforementioned fairy tale, breadcrumb navigation consists of a path leading home. In this case, home is the homepage. With breadcrumb navigation, you can more easily keep track of how you got to the current web page you’re on, as well as the path back to the home page. This path can typically be viewed at the top of the page. Each step includes a link that navigates back to a specific page.

Let’s say that you’re looking at a service page on a website. If the path you took leads back to the home page, you’ll see all of the pages in between in the breadcrumbs menu. For the sake of this example, let’s say the pages in between are the second menu item and the fifth menu item. It would look something like this:

Home > [Menu 2] > [Menu Item 5]

Since these breadcrumbs are links, you can click on any one of them to be brought back to that page. This lets you continue browsing with minimal chance of getting lost on the site trying to backtrack.

More Than Just Websites
You might notice that this navigation style is similar to the ones used in toolbars in file folders or files saved on your desktop. The reason is the same--it makes finding certain files easier at a later date. The location can also be shared with others who need to know where it is.

Breadcrumbs are typically meant for helping users with browsing and organization. Are there any other features out there you can think of that do the same thing? Let us know in the comments.

The Right Data Recovery Strategy Is Important to P...
Can You Afford to Ditch Your Telephone System for ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Network Security Malware Gadgets Email Quick Tips Efficiency Network IT Support Innovation Business Management IT Services Business Social Media Smartphones Business Continuity Miscellaneous Server Upgrade Virtualization Communication User Tips Communications Windows Disaster Recovery Data Backup Computer Microsoft Office Managed IT Services Data Recovery Smartphone Users Mobile Device Management Passwords Browser Android Holiday Internet of Things Save Money WiFi Marketing Tech Term Outsourced IT Ransomware Alert Vendor Management Artificial Intelligence BDR Mobile Computing Cloud Computing Cybercrime Windows 10 Operating System Remote Monitoring Chrome Productivity Router BYOD Information Technology Avoiding Downtime Computers Cybersecurity Bring Your Own Device Automation Apple Remote Computing Going Green IT Solutions Current Events Health The Internet of Things Best Practice VPN Managed IT Services History Telephone Systems Collaboration Spam Firewall Big Data Employer-Employee Relationship Trending Application Phone System Hacking Wireless Technology Proactive IT Printer Social Engineering Facebook IT Consultant Mobile Device Windows 10 Office IT Support Mobility Budget Excel Money App Bandwidth Lithium-ion Battery Business Managament Phishing Two-factor Authentication Fax Server Unified Threat Management Maintenance Windows 8 Recovery iPhone Private Cloud Training Mouse How To Office 365 Content Filtering Applications Business Intelligence Encryption Networking Gmail Outlook Tutorials Apps Analytics Virus File Sharing Settings Google Drive PowerPoint Managed IT Sports Access Control Value Data Protection Customer Relationship Management Blockchain Word Hard Drives Redundancy Save Time Information Law Enforcement Data Security Website User Error Antivirus Humor Flexibility Entertainment Digital Payment Connectivity Social Networking IT Management Downtime Servers Computer Repair Memory Retail Human Resources Conferencing Vulnerability Administrator Software as a Service Network Congestion Hacker Tech Support Search Wi-Fi Tablet Twitter Document Management Scam Inbound Marketing Machine Learning Social Streaming Media Risk Management Data Management Identity Theft Office Tips Analysis Administration Saving Time Managed Service Voice over Internet Protocol Compliance Running Cable Cleaning Credit Cards Password Augmented Reality Business Technology Intranet Wireless Physical Security Public Cloud Wearable Technology Video Surveillance Net Neutrality SaaS Instant Messaging Fraud Virtual Assistant CES Environment Webinar OneNote Display Data storage Best Available IT Plan Healthcare Piracy Bluetooth Help Desk IBM Biometrics People Internet Exlporer Data Storage IT service Leadership Telephone System eWaste Content Management Unsupported Software PDF Keyboard Infrastructure Samsung Computer Accessories Work/Life Balance Safety Data Breach HaaS End of Support YouTube Smart Tech Online Currency Update Government Recycling Meetings Workers Point of Sale Education Telephony USB Comparison Robot Statistics Windows 7 DDoS Google Docs Solid State Drive Data loss Botnet Touchscreen Programming Black Market Skype Paperless Office Spam Blocking Virtual Private Network HBO Screen Mirroring ISP Accountants Travel 360 Criminal Upgrades Emails Analyitcs Addiction Electronic Medical Records Customer Service Enterprise Content Management Employee/Employer Relationship Mobile Cortana Wiring LinkedIn Notifications Millennials Students Bing Business Owner Laptop Wireless Charging Consultant Hosted Computing Proactive Multi-Factor Security Colocation Strategy Windows 10s Cache Project Management Frequently Asked Questions Shadow IT Charger Cast File Versioning Windows 8.1 Update SharePoint Workforce Hiring/Firing Hybrid Cloud Cameras Smartwatch Password Management Professional Services HIPAA Google Apps Webcam Devices GDPR Shortcuts Debate Flash Touchpad Fiber-Optic Licensing Inventory Remote Monitoring and Maintenance IaaS Lifestyle Computing Infrastructure Wireless Internet Warranty Tip of the week Amazon Computer Care Legal WIndows 7 Multiple Versions IoT Hosted Solution Relocation Virtual Reality Telecommuting Printer Server Shortcut Employee PC Care NIST Tools Monitor Thought Leadership E-Commerce 3D Electronic Health Records eCommerce Sync Cables User Scheduling Line of Business Worker Commute Audit Wire eBay Microchip Windows Server 2008 Amazon Web Services Managing Stress Domains Restore Data Netflix Bloatware Software Tips Remote Work Root Cause Analysis Digital Signage Cryptocurrency Alerts Reputation Password Manager Science Content Filter Camera Macro IT Security Vendor Unified Communications Supercomputer Authentication MSP Internet exploMicrosoft Computer Fan Co-managed IT Smart Office Text Messaging Print Server NarrowBand Online Shopping Backup and Disaster Recovery Insurance Staff Entrepreneur Crowdfunding Uninterrupted Power Supply Google Search Remote Support Safe Mode Work Station Customers Business Mangement Tablets Gaming Console Storage nternet Virtual Desktop HVAC Security Cameras Start Menu Theft Hiring/Firing Knowledge Nanotechnology Remote Worker Data Warehousing Specifications Advertising Windows Media Player FENG Law Firm IT Search Engine Regulations Chromecast Evernote Practices Company Culture Distributed Denial of Service Patch Management Files Digital Signature Cost Management Rootkit Politics Television How to Transportation Techology Troubleshooting Webinar Automobile Public Computer Benefits Thank You IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Congratulations Regulation Books Experience Content Battery Two Factor Authentication Utility Computing Video Games Emergency Worker Music Printers Audiobook Assessment Scalability Cryptomining

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *