Browse Definitions :

Things you can do when you get to a bridge: Cross, burn or jump

Writing for Business

Which is correct?
We’ll _____ that bridge when we come to it.
a. cross
b. burn
c. jump off


Answer: It depends.

Explanation:
The standard expression is “cross that bridge when we come to it.” It means that you’ll deal with some potential event if and when it happens — it may not happen at all and if it does, it may be easier to see how to deal with it at that time.

“We’ll burn that bridge when we come to it” is considered to be a mixed metaphor/malaphor: an erroneous mixing of two metaphors. In this case, it’s a combination of “cross that bridge when one comes to it” and “to burn one’s bridges,” meaning to take an action that will eliminate some potential option. For example, if you toss your venti latte in the recruiter’s face at a job fair, you’re likely burning your bridges with that company. So if it may be necessary to decisively eliminate some option in the future, it would make sense to say you’ll burn that bridge when you come to it. I don’t think anyone does say that, mind you, but it would make perfect sense.

And then, of course, the other option is to jump. Site director Peggy Rouse occasionally says, when we’re discussing some deeply undesirable potential event, “Let’s jump off that bridge when we come to it.” Naturally, you don’t want to do it preemptively, as the undesirable event may never happen. And there hasn’t been anything that catastrophic yet. Should we come to the bridge we prefer not to cross, however, I picture us clasping hands like Thelma and Louise approaching that cliff and leaping. Unless we just decide to burn it instead.

So, anyway, what I’m saying is that I can see occasions for any of the three, depending on the particular bridge you’ve come to.

Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
Security
  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

  • privileged identity management (PIM)

    Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an ...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close