Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

It's one of the most recognizable icons in modern digital design: three short, horizontal lines stacked neatly together. You've seen it countless times, representing the main menu on nearly every website and application. Sometimes it transforms into three dots—a "kabob" menu, if you want a fun fact, but its function remains the same: it's the gateway to everything your site has to offer.

With over 64% of all website traffic coming from mobile devices earlier this year, this tiny icon has become a massive deal. Its presence dictates how users navigate and, ultimately, how your business is perceived online.

But is tucking away your navigation always a good idea? Let's dive into the fascinating origin story of the hamburger menu and weigh its pros and cons to help you optimize your website's setup.

Why a "Hamburger?” A Trip Back to 1981

To understand the hamburger menu, we have to look back over four decades to the dawn of the commercial personal computer.

In 1981, the Xerox Star was in production. Designer Norm Cox was tasked with a foundational challenge: creating a set of intuitive icons for the graphical user interface (GUI) to make the complex new machine user-friendly for the average consumer.

Cox’s work is legendary and still informs modern design. The icon for a new document (a sheet of paper with a folded corner) and the folder icon for directories both came from his initial set. But the most widely used—the three-lined menu—was a masterpiece of minimalist design. Cox explained the careful thought process:

"Its graphic design was meant to be very ‘road sign’ simple, functionally memorable, and mimic the look of the resulting displayed menu list. With so few pixels to work with, it had to be very distinct, yet simple.”

Though the design was replaced in 1987, it staged a massive comeback around 2009 with the rise of smartphones. The limited screen real estate of these new pocket-sized computers made the hamburger menu's ability to maximize space invaluable, cementing its role in today's digital landscape.

The Pros

The hamburger menu's success is rooted in its inherent advantages, especially for mobile optimization:

  • Space efficiency - This is the primary driver. On a small screen, there's simply no room for a fully spelled-out navigation bar like: Home | About | Services | Contact. The hamburger icon offers a single, non-distracting button that neatly houses all your links.
  • Improved user experience - By simplifying the visual design, the hamburger menu minimizes cognitive load. Users are presented with a clean interface dedicated to the content, and when they need to navigate, a well-organized drop-down is easier to scan than a crowded top bar.
  • Improved marketing - Fewer distractions mean more focus on your core message. Tucking away the navigation frees up crucial above-the-fold space for compelling headlines, engaging visuals, and clear calls-to-action (CTAs).

The Cons

While efficient, this design approach isn't without its potential pitfalls, largely because hidden content is sometimes forgotten content:

  • Increased user friction - Hiding the menu means adding an extra click. Instead of a one-click action, a user must click the icon then click the desired page. If your navigation isn't immediately obvious or easy to find, you risk frustrating visitors and increasing your bounce rate.
  • Visibility vs. concealment - You must carefully decide which pages are important enough to live outside the menu. Pages that are vital to your business may suffer from decreased visibility if they are exclusively hidden inside the hamburger icon.

To mitigate the cons, ensure your most crucial, high-value pages are accessible via links on the homepage or through a complementary, always-visible navigation element like a bottom bar.

The hamburger menu is a powerhouse of efficiency, especially on mobile, but it requires strategic implementation. Its simple three-line design is far more complex than it looks, demanding that you strike a delicate balance between a clean interface and immediate content accessibility.

Check back in this space regularly to read more about today’s business technology.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Conferencing Office 365 Marketing How To BDR HIPAA Applications 2FA Virtual Private Network Risk Management Help Desk Computers Health Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Windows 11 Physical Security Monitoring Customer Service Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Firewall Project Management Scam Windows 7 Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime VPN YouTube Meetings Holidays Data Storage Cryptocurrency Smart Technology Supply Chain Hacking Video Conferencing Presentation Computer Repair Managed Services Provider Professional Services Virtual Desktop Saving Time Virtual Machines Data storage LiFi Wireless Technology Managed IT Service Outlook Machine Learning Downloads Money iPhone Humor Licensing Word Vulnerabilities Entertainment Data Privacy Maintenance Sports Antivirus Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Safety Administration Cost Management Robot Employees Integration Settings Wireless User Tip Modem Printing Mobile Security Content Filtering Processor IT Management Customer Relationship Management Cyber Monday Medical IT Network Congestion Proxy Server Reviews Cookies Tactics Development Google Drive User Error Hotspot Transportation Small Businesses Competition Knowledge Mirgation Hypervisor Displays PowerPoint Point of Sale 5G Shopping Nanotechnology Optimization Addiction Google Docs Language Employer/Employee Relationships Outsourcing Unified Communications Experience Running Cable Tech Support User Management PCI DSS Chatbots Bitcoin Network Management Navigation Google Wallet Distributed Denial of Service Workplace Monitors Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Laptop Websites Regulations Compliance Identity Windows 8 Evernote Paperless IP Address Drones Co-managed IT Bookmark Smart Tech Memes Download Net Neutrality SharePoint Alerts SQL Server Technology Care Electronic Medical Records Halloween Recovery Financial Data History Business Communications Lenovo Break Fix Scams Hard Drives Writing Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Domains Virtual Reality Scary Stories Private Cloud Social Network Telework Cyber security Hacks Server Management Multi-Factor Security Tech Human Resources Superfish Dark Web Cables Identity Theft Refrigeration Fun CES IoT Communitications Trends Supply Chain Management Deep Learning Public Speaking Twitter Error Customer Resource management FinTech Regulations Google Calendar Term Google Apps Lithium-ion battery Microsoft Excel IT Maintenance Education Social Engineering Entrepreneur Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Remote Computing Organization Social Networking Mobile Computing Legislation Shortcuts Ransmoware Tablet Undo Search Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Best Practice Alert Buisness File Sharing Dark Data Health IT Motherboard Data Breach Managed IT Comparison Google Play Be Proactive Legal Permissions Workforce IT solutions How To Directions Videos Assessment Electronic Health Records Wasting Time Threats Business Growth Notifications Travel Application Trend Micro Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Techology Fraud Meta Google Maps Cortana Microchip Username Managing Costs Amazon Alt Codes IBM Black Friday SSID Downtime Unified Threat Management eCommerce Database Surveillance Unified Threat Management Virtual Assistant Outsource IT Hosted Solution IT Technicians Virtual Machine Environment Typing Media

Blog Archive