Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

It's one of the most recognizable icons in modern digital design: three short, horizontal lines stacked neatly together. You've seen it countless times, representing the main menu on nearly every website and application. Sometimes it transforms into three dots—a "kabob" menu, if you want a fun fact, but its function remains the same: it's the gateway to everything your site has to offer.

With over 64% of all website traffic coming from mobile devices earlier this year, this tiny icon has become a massive deal. Its presence dictates how users navigate and, ultimately, how your business is perceived online.

But is tucking away your navigation always a good idea? Let's dive into the fascinating origin story of the hamburger menu and weigh its pros and cons to help you optimize your website's setup.

Why a "Hamburger?” A Trip Back to 1981

To understand the hamburger menu, we have to look back over four decades to the dawn of the commercial personal computer.

In 1981, the Xerox Star was in production. Designer Norm Cox was tasked with a foundational challenge: creating a set of intuitive icons for the graphical user interface (GUI) to make the complex new machine user-friendly for the average consumer.

Cox’s work is legendary and still informs modern design. The icon for a new document (a sheet of paper with a folded corner) and the folder icon for directories both came from his initial set. But the most widely used—the three-lined menu—was a masterpiece of minimalist design. Cox explained the careful thought process:

"Its graphic design was meant to be very ‘road sign’ simple, functionally memorable, and mimic the look of the resulting displayed menu list. With so few pixels to work with, it had to be very distinct, yet simple.”

Though the design was replaced in 1987, it staged a massive comeback around 2009 with the rise of smartphones. The limited screen real estate of these new pocket-sized computers made the hamburger menu's ability to maximize space invaluable, cementing its role in today's digital landscape.

The Pros

The hamburger menu's success is rooted in its inherent advantages, especially for mobile optimization:

  • Space efficiency - This is the primary driver. On a small screen, there's simply no room for a fully spelled-out navigation bar like: Home | About | Services | Contact. The hamburger icon offers a single, non-distracting button that neatly houses all your links.
  • Improved user experience - By simplifying the visual design, the hamburger menu minimizes cognitive load. Users are presented with a clean interface dedicated to the content, and when they need to navigate, a well-organized drop-down is easier to scan than a crowded top bar.
  • Improved marketing - Fewer distractions mean more focus on your core message. Tucking away the navigation frees up crucial above-the-fold space for compelling headlines, engaging visuals, and clear calls-to-action (CTAs).

The Cons

While efficient, this design approach isn't without its potential pitfalls, largely because hidden content is sometimes forgotten content:

  • Increased user friction - Hiding the menu means adding an extra click. Instead of a one-click action, a user must click the icon then click the desired page. If your navigation isn't immediately obvious or easy to find, you risk frustrating visitors and increasing your bounce rate.
  • Visibility vs. concealment - You must carefully decide which pages are important enough to live outside the menu. Pages that are vital to your business may suffer from decreased visibility if they are exclusively hidden inside the hamburger icon.

To mitigate the cons, ensure your most crucial, high-value pages are accessible via links on the homepage or through a complementary, always-visible navigation element like a bottom bar.

The hamburger menu is a powerhouse of efficiency, especially on mobile, but it requires strategic implementation. Its simple three-line design is far more complex than it looks, demanding that you strike a delicate balance between a clean interface and immediate content accessibility.

Check back in this space regularly to read more about today’s business technology.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Android Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Cloud Computing Gadgets Covid-19 Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Mobile Device Management Gmail Apple Networking App WiFi BYOD Employer-Employee Relationship Hacker Access Control Office 365 Avoiding Downtime Marketing Conferencing How To BDR HIPAA Computing Applications Information Technology Computers Health Help Desk Analytics Office Tips Augmented Reality Website Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data 2FA Operating System Router Virtual Private Network Risk Management Paperless Office Infrastructure Monitoring Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Going Green Patch Management Save Money Microsoft 365 Social Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Solutions Cybercrime Excel Physical Security Display Customer Service Printer Presentation Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Wireless Technology Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Data Privacy Virtual Machines Humor Managed IT Service Word Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Safety Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Supply Chain VPN Employees YouTube Meetings Integration Customer Relationship Management Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Hacking Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Technology Care Cookies Tactics Development Business Communications Hotspot Transportation User Windows 8 Scams Laptop Websites Mirgation Hypervisor PowerPoint Drones Shopping Hybrid Work Nanotechnology Optimization Addiction Human Resources Electronic Medical Records Language Employer/Employee Relationships IP Address SharePoint Management PCI DSS Cables Halloween Chatbots Navigation Writing Distributed Denial of Service Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Google Apps Virtual Reality Computing Infrastructure Teamwork Recovery Hard Drives Hacks Server Management Regulations Compliance IT Maintenance Scary Stories Private Cloud Identity Evernote Fun Domains Superfish Bookmark Business Intelligence Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Shortcuts Twitter Alerts SQL Server Refrigeration Financial Data Ransmoware Error History Social Engineering Break Fix Public Speaking Browsers Smartwatch Vendors Education Connectivity IT Upload Procurement Be Proactive Remote Computing Azure Lithium-ion battery Entrepreneur Mobile Computing Social Network Telework Workforce Cyber security Multi-Factor Security Tech Search Dark Web CES Threats Tablet IoT Communitications Best Practice Trends Supply Chain Management Workplace Strategies Alert Undo Managed IT Customer Resource management FinTech Meta Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Legal Data Analysis Amazon IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Organization Outsource IT Travel Social Networking Legislation Media Cortana Techology Fileless Malware Digital Security Cameras Environment Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Application Health IT Small Businesses Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Hosted Solution Assessment Electronic Health Records Permissions IBM Unified Threat Management Directions Videos Displays Typing Wasting Time Network Congestion Specifications Security Cameras Outsourcing Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Google Drive User Error Microchip Username Workplace Managing Costs 5G Black Friday SSID Competition Hiring/Firing Point of Sale eCommerce Unified Communications Database Surveillance Paperless Experience Virtual Assistant Google Docs Bitcoin Network Management Co-managed IT Running Cable Tech Support IT Technicians Virtual Machine

Blog Archive