Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

It's one of the most recognizable icons in modern digital design: three short, horizontal lines stacked neatly together. You've seen it countless times, representing the main menu on nearly every website and application. Sometimes it transforms into three dots—a "kabob" menu, if you want a fun fact, but its function remains the same: it's the gateway to everything your site has to offer.

With over 64% of all website traffic coming from mobile devices earlier this year, this tiny icon has become a massive deal. Its presence dictates how users navigate and, ultimately, how your business is perceived online.

But is tucking away your navigation always a good idea? Let's dive into the fascinating origin story of the hamburger menu and weigh its pros and cons to help you optimize your website's setup.

Why a "Hamburger?” A Trip Back to 1981

To understand the hamburger menu, we have to look back over four decades to the dawn of the commercial personal computer.

In 1981, the Xerox Star was in production. Designer Norm Cox was tasked with a foundational challenge: creating a set of intuitive icons for the graphical user interface (GUI) to make the complex new machine user-friendly for the average consumer.

Cox’s work is legendary and still informs modern design. The icon for a new document (a sheet of paper with a folded corner) and the folder icon for directories both came from his initial set. But the most widely used—the three-lined menu—was a masterpiece of minimalist design. Cox explained the careful thought process:

"Its graphic design was meant to be very ‘road sign’ simple, functionally memorable, and mimic the look of the resulting displayed menu list. With so few pixels to work with, it had to be very distinct, yet simple.”

Though the design was replaced in 1987, it staged a massive comeback around 2009 with the rise of smartphones. The limited screen real estate of these new pocket-sized computers made the hamburger menu's ability to maximize space invaluable, cementing its role in today's digital landscape.

The Pros

The hamburger menu's success is rooted in its inherent advantages, especially for mobile optimization:

  • Space efficiency - This is the primary driver. On a small screen, there's simply no room for a fully spelled-out navigation bar like: Home | About | Services | Contact. The hamburger icon offers a single, non-distracting button that neatly houses all your links.
  • Improved user experience - By simplifying the visual design, the hamburger menu minimizes cognitive load. Users are presented with a clean interface dedicated to the content, and when they need to navigate, a well-organized drop-down is easier to scan than a crowded top bar.
  • Improved marketing - Fewer distractions mean more focus on your core message. Tucking away the navigation frees up crucial above-the-fold space for compelling headlines, engaging visuals, and clear calls-to-action (CTAs).

The Cons

While efficient, this design approach isn't without its potential pitfalls, largely because hidden content is sometimes forgotten content:

  • Increased user friction - Hiding the menu means adding an extra click. Instead of a one-click action, a user must click the icon then click the desired page. If your navigation isn't immediately obvious or easy to find, you risk frustrating visitors and increasing your bounce rate.
  • Visibility vs. concealment - You must carefully decide which pages are important enough to live outside the menu. Pages that are vital to your business may suffer from decreased visibility if they are exclusively hidden inside the hamburger icon.

To mitigate the cons, ensure your most crucial, high-value pages are accessible via links on the homepage or through a complementary, always-visible navigation element like a bottom bar.

The hamburger menu is a powerhouse of efficiency, especially on mobile, but it requires strategic implementation. Its simple three-line design is far more complex than it looks, demanding that you strike a delicate balance between a clean interface and immediate content accessibility.

Check back in this space regularly to read more about today’s business technology.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade AI Data Recovery VoIP Business Management Smartphones communications Disaster Recovery Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Chrome Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Computing Information Technology Hacker Conferencing Avoiding Downtime Access Control Office 365 Marketing WiFi HIPAA How To BDR Applications Computers Virtual Private Network Risk Management Health Healthcare Website Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data 2FA Operating System Help Desk Customer Service Physical Security Excel Display Printer Remote Workers Paperless Office Infrastructure Telephone Document Management Cooperation Free Resource Project Management Firewall Windows 7 Microsoft 365 Scam Data loss The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Monitoring Cybercrime VPN Video Conferencing YouTube Meetings Hacking Managed Services Provider Saving Time Cryptocurrency Presentation Virtual Machines Professional Services Computer Repair Wireless Technology Managed IT Service Virtual Desktop LiFi Downloads Data storage iPhone Licensing Outlook Entertainment Machine Learning Word Vulnerabilities Money Data Privacy Humor Images 101 Maintenance Multi-Factor Authentication Mobility Telephone System Antivirus Cost Management Sports Mouse Safety Administration Employees Integration User Tip Modem Processor Mobile Security Robot Holidays Settings Printing Customer Relationship Management Wireless Content Filtering Data Storage IT Management Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Network Congestion Chatbots Knowledge Navigation Google Drive User Error Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Point of Sale User Computing Infrastructure Teamwork Hiring/Firing 5G Unified Communications Identity Experience Evernote Paperless Google Docs Regulations Compliance Bookmark Bitcoin Network Management Smart Tech Memes Running Cable Tech Support Co-managed IT Monitors Google Wallet IP Address Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Financial Data Browsers Smartwatch Windows 8 Connectivity IT Laptop Websites Break Fix Scams Drones Upload Procurement Recovery Azure Hybrid Work Hard Drives Cyber security Electronic Medical Records Multi-Factor Security Tech Human Resources SharePoint Social Network Telework CES Domains IoT Communitications Halloween Dark Web Cables Writing Lenovo Trends Supply Chain Management Refrigeration Regulations Virtual Reality Google Calendar Term Google Apps Customer Resource management FinTech Data Analysis Hacks Server Management Public Speaking Star Wars IT Assessment Scary Stories Private Cloud Microsoft Excel IT Maintenance Fun Superfish Lithium-ion battery Gamification Flexibility Identity Theft Staff Value Business Intelligence Deep Learning Social Networking Twitter Entrepreneur Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Smart Devices Error Ransmoware Social Engineering Content Remote Working Education Wearable Technology Memory Vendors Undo Motherboard Data Breach Remote Computing Comparison Google Play Be Proactive Health IT Directions Videos Mobile Computing Assessment Electronic Health Records Permissions Workforce Search Tablet Wasting Time Threats Best Practice Trend Micro Alert Specifications Security Cameras Workplace Strategies Microchip Managed IT Internet Exlporer Software as a Service Buisness File Sharing Fraud Meta Dark Data How To Legal Username IT solutions Application Managing Costs Amazon Business Growth eCommerce Notifications Black Friday SSID IBM Database Surveillance Travel Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Cortana Media Techology Google Maps Proxy Server Reviews Alt Codes Cookies Cyber Monday Medical IT Tactics Development Downtime Unified Threat Management Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Unified Threat Management Hosted Solution Shopping Typing Competition Nanotechnology Optimization PowerPoint

Blog Archive