Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Explaining Dark Mode

Explaining Dark Mode

Dark mode is becoming commonplace in most modern technology solutions, incorporated into both desktop and mobile applications and even some operating systems. Despite being embraced by vendors and users, what does dark mode actually offer in terms of benefits? Let’s find out.

Dark Mode Is Not a New Concept

Dark mode has been around for quite some time--longer than you probably think, at any rate. In the early days of computing, screens were simple monochromatic monitors using only black and white. Early CRTs, or cathode-ray tubes, were coated with phosphor, giving the on-screen text a green, amber, or white hue. This would be displayed on a black background. This all changed in the 1980s when monitors began to focus on replicating the look of ink typed onto white paper.

All this time later, dark mode has now become a staple in most technology, which is ironic considering the fact that it was utilized in the past due to technical challenges rather than it being used as a choice.

The Benefits(?)

Dark mode inverts the background from white to black and the text from black to white. The main benefit to this is that it saves energy consumption on OLED and AMOLED technology, primarily on smartphones. Dark mode essentially turns off the pixels that are not in use and reduces the energy needed to keep them all on when the background is white.

Additionally, dark mode allows devices to remain operational even when the batteries grow low. Google notes that using its dark theme can be a major boon for increasing battery life. Here are some of the benefits:

  • Visibility improvement for users with low vision or light sensitivity
  • Easier to use in low-light environments
  • The potential to reduce eye strain

Some Potential Negative Issues With Dark Mode

The biggest challenges facing users of dark mode have to do with people who have astigmatism, an ailment that might make reading white text on a black background difficult. There is research to suggest that dark mode can lower reading comprehension, as well, due to our innate preference for dark images on light backgrounds. Here are some other concerns to think about:

  • Tiny and long blocks of text may be more difficult to read
  • Color blindness can affect the ability of users to read the text in dark mode 
  • It may be harder to see in different lighting environments

All that said, most people can still use dark mode perfectly fine with few, if any, concerns.

Dark Mode is Now a Staple

Smartphones were the initial driving factor for dark mode, but many software vendors have jumped on the bandwagon, adding dark mode functionality in response to user expectations. If users keep asking how to switch to dark mode, it makes sense for developers to consider adding it as an option. Dark mode is widely supported by most operating systems, browsers, social media apps, productivity apps, and more.

Should You Use Dark Mode?

Strictly speaking, it depends on your preference. While there are clear benefits to using dark mode, it might not be ideal for some users. For most people, however, it is going to boil down to form over function. Sometimes changing things up with dark mode is fun, but in the end, it’s going to depend on personal preference.

Where do you stand on the light mode/dark mode debate? Do you prefer to use dark mode, and if so, why? Be sure to sound off in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Smartphones Android Business Management VoIP Mobile Devices communications Upgrade Managed Service Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Tech Term Remote Internet of Things Current Events Productivity Artificial Intelligence Facebook Automation Gadgets Cloud Computing Covid-19 Server AI Managed Service Provider Remote Work Miscellaneous Outsourced IT Information Holiday Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Training Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD Mobile Device Management Vendor Chrome Gmail Budget Apple Conferencing How To Computing Hacker BDR Information Technology Avoiding Downtime Marketing Office 365 IT Support Applications Access Control WiFi Tip of the week Retail Healthcare Operating System Managed IT Services Computers Risk Management Website HIPAA Analytics Office Tips Router Augmented Reality Virtual Private Network Storage Health Password Bring Your Own Device Help Desk Big Data Remote Workers Going Green Telephone Scam Data loss Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Firewall Display Printer Windows 11 Paperless Office Infrastructure The Internet of Things Monitoring 2FA Excel Document Management Social Managed IT Service Maintenance Downloads Customer Relationship Management Antivirus iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities Hacking Entertainment YouTube Data Privacy Presentation Cryptocurrency Images 101 Wireless Technology Robot Mobility Telephone System Multi-Factor Authentication Cost Management Virtual Desktop Data storage LiFi Word IT Management Outlook VPN Employees Meetings Integration Money Humor User Tip Modem Computer Repair Mobile Security Processor Safety Holidays Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Evernote Paperless IBM Legal IT solutions Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Business Growth Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Cortana Error History Connectivity IT Social Engineering Break Fix Scams Alt Codes Browsers Smartwatch Downtime Upload Procurement Remote Computing Azure Hybrid Work Competition Multi-Factor Security Tech Human Resources Hosted Solution Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Typing CES Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Google Drive User Managed IT Customer Resource management FinTech Knowledge File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility 5G Notifications Staff Value Business Intelligence Legislation Shortcuts IP Address Google Docs Unified Communications Organization Experience Travel Social Networking Google Maps Smart Devices Ransmoware Bitcoin Techology Fileless Malware Digital Security Cameras Running Cable Content Remote Working Wearable Technology Memory Vendors Google Wallet Comparison Google Play Be Proactive Recovery Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Hard Drives Windows 8 Unified Threat Management Directions Videos Laptop Wasting Time Threats Domains Drones Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta Refrigeration User Error Microchip Halloween Username Managing Costs Amazon Public Speaking Black Friday SSID Lithium-ion battery Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Hacks Entrepreneur Scary Stories Network Management Fun Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Deep Learning Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Undo Education Websites Mirgation Hypervisor Displays PowerPoint Shopping Nanotechnology Optimization SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Mobile Computing Management PCI DSS Search Chatbots Navigation Screen Reader Writing Distributed Denial of Service Workplace Application Best Practice Lenovo Gig Economy Buisness Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing

Blog Archive