Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

It's one of the most recognizable icons in modern digital design: three short, horizontal lines stacked neatly together. You've seen it countless times, representing the main menu on nearly every website and application. Sometimes it transforms into three dots—a "kabob" menu, if you want a fun fact, but its function remains the same: it's the gateway to everything your site has to offer.

With over 64% of all website traffic coming from mobile devices earlier this year, this tiny icon has become a massive deal. Its presence dictates how users navigate and, ultimately, how your business is perceived online.

But is tucking away your navigation always a good idea? Let's dive into the fascinating origin story of the hamburger menu and weigh its pros and cons to help you optimize your website's setup.

Why a "Hamburger?” A Trip Back to 1981

To understand the hamburger menu, we have to look back over four decades to the dawn of the commercial personal computer.

In 1981, the Xerox Star was in production. Designer Norm Cox was tasked with a foundational challenge: creating a set of intuitive icons for the graphical user interface (GUI) to make the complex new machine user-friendly for the average consumer.

Cox’s work is legendary and still informs modern design. The icon for a new document (a sheet of paper with a folded corner) and the folder icon for directories both came from his initial set. But the most widely used—the three-lined menu—was a masterpiece of minimalist design. Cox explained the careful thought process:

"Its graphic design was meant to be very ‘road sign’ simple, functionally memorable, and mimic the look of the resulting displayed menu list. With so few pixels to work with, it had to be very distinct, yet simple.”

Though the design was replaced in 1987, it staged a massive comeback around 2009 with the rise of smartphones. The limited screen real estate of these new pocket-sized computers made the hamburger menu's ability to maximize space invaluable, cementing its role in today's digital landscape.

The Pros

The hamburger menu's success is rooted in its inherent advantages, especially for mobile optimization:

  • Space efficiency - This is the primary driver. On a small screen, there's simply no room for a fully spelled-out navigation bar like: Home | About | Services | Contact. The hamburger icon offers a single, non-distracting button that neatly houses all your links.
  • Improved user experience - By simplifying the visual design, the hamburger menu minimizes cognitive load. Users are presented with a clean interface dedicated to the content, and when they need to navigate, a well-organized drop-down is easier to scan than a crowded top bar.
  • Improved marketing - Fewer distractions mean more focus on your core message. Tucking away the navigation frees up crucial above-the-fold space for compelling headlines, engaging visuals, and clear calls-to-action (CTAs).

The Cons

While efficient, this design approach isn't without its potential pitfalls, largely because hidden content is sometimes forgotten content:

  • Increased user friction - Hiding the menu means adding an extra click. Instead of a one-click action, a user must click the icon then click the desired page. If your navigation isn't immediately obvious or easy to find, you risk frustrating visitors and increasing your bounce rate.
  • Visibility vs. concealment - You must carefully decide which pages are important enough to live outside the menu. Pages that are vital to your business may suffer from decreased visibility if they are exclusively hidden inside the hamburger icon.

To mitigate the cons, ensure your most crucial, high-value pages are accessible via links on the homepage or through a complementary, always-visible navigation element like a bottom bar.

The hamburger menu is a powerhouse of efficiency, especially on mobile, but it requires strategic implementation. Its simple three-line design is far more complex than it looks, demanding that you strike a delicate balance between a clean interface and immediate content accessibility.

Check back in this space regularly to read more about today’s business technology.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Smartphones Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Virtual Private Network Risk Management Computers 2FA Health Help Desk Office Tips Analytics Website Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Going Green Patch Management Social Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management The Internet of Things Cooperation Windows 7 Microsoft 365 Telephone System Robot Cost Management Settings Printing Wireless Content Filtering Employees IT Management Integration Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Computer Repair Mobile Security Processor Holidays Presentation Data Storage Virtual Desktop Data storage LiFi Supply Chain Wireless Technology Video Conferencing Managed Services Provider Smart Technology Outlook Virtual Machines Professional Services Machine Learning Money Saving Time Word Humor Managed IT Service Maintenance iPhone Antivirus Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Safety Entertainment Administration Images 101 Multi-Factor Authentication Mobility Remote Working Memory Vendors Travel Social Networking Application Legislation Techology Fileless Malware Data Breach Google Maps Google Play Be Proactive Cortana Alt Codes Content Workforce IBM Wearable Technology Videos Electronic Health Records Health IT Wasting Time Threats Downtime Unified Threat Management Motherboard Comparison Permissions Unified Threat Management Directions Trend Micro Hosted Solution Assessment Security Cameras Workplace Strategies Typing Meta Software as a Service Managing Costs Amazon Network Congestion Specifications Knowledge Fraud Google Drive User Error Microchip eCommerce Internet Exlporer SSID Competition Username Virtual Assistant Outsource IT Surveillance Virtual Machine Environment Point of Sale Media 5G Black Friday Experience Reviews Google Docs Unified Communications Database Medical IT Bitcoin Network Management Transportation Small Businesses Running Cable Tech Support IT Technicians User Development Google Wallet Proxy Server Hypervisor Displays Cookies Monitors Cyber Monday Hotspot Shopping Optimization Tactics PowerPoint Windows 8 Employer/Employee Relationships Outsourcing IP Address Laptop Websites Mirgation PCI DSS Drones Nanotechnology Navigation Electronic Medical Records Language Gig Economy SharePoint Addiction Workplace Management Teamwork Hiring/Firing Halloween Chatbots Recovery Internet Service Provider Regulations Compliance Lenovo Screen Reader Evernote Paperless Hard Drives Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Memes Service Level Agreement Co-managed IT Domains Hacks Server Management SQL Server Technology Care Scary Stories Private Cloud Identity Net Neutrality Financial Data Superfish Bookmark History Identity Theft Smart Tech Business Communications Refrigeration Fun Twitter Alerts Smartwatch IT Deep Learning Download Scams Public Speaking Azure Hybrid Work Lithium-ion battery Error Procurement Telework Browsers Cyber security Education Connectivity Tech Human Resources Social Engineering Break Fix Entrepreneur Remote Computing CES Communitications Upload Cables Mobile Computing Social Network Multi-Factor Security Supply Chain Management FinTech Tablet IoT Term Google Apps Undo Search Dark Web Alert IT Assessment Best Practice Trends IT Maintenance Flexibility Managed IT Customer Resource management Value Business Intelligence Buisness File Sharing Regulations Dark Data Google Calendar Organization Legal Data Analysis IT solutions Star Wars Shortcuts How To Microsoft Excel Ransmoware Notifications Staff Digital Security Cameras Smart Devices Business Growth Gamification

Blog Archive