Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon

It's one of the most recognizable icons in modern digital design: three short, horizontal lines stacked neatly together. You've seen it countless times, representing the main menu on nearly every website and application. Sometimes it transforms into three dots—a "kabob" menu, if you want a fun fact, but its function remains the same: it's the gateway to everything your site has to offer.

With over 64% of all website traffic coming from mobile devices earlier this year, this tiny icon has become a massive deal. Its presence dictates how users navigate and, ultimately, how your business is perceived online.

But is tucking away your navigation always a good idea? Let's dive into the fascinating origin story of the hamburger menu and weigh its pros and cons to help you optimize your website's setup.

Why a "Hamburger?” A Trip Back to 1981

To understand the hamburger menu, we have to look back over four decades to the dawn of the commercial personal computer.

In 1981, the Xerox Star was in production. Designer Norm Cox was tasked with a foundational challenge: creating a set of intuitive icons for the graphical user interface (GUI) to make the complex new machine user-friendly for the average consumer.

Cox’s work is legendary and still informs modern design. The icon for a new document (a sheet of paper with a folded corner) and the folder icon for directories both came from his initial set. But the most widely used—the three-lined menu—was a masterpiece of minimalist design. Cox explained the careful thought process:

"Its graphic design was meant to be very ‘road sign’ simple, functionally memorable, and mimic the look of the resulting displayed menu list. With so few pixels to work with, it had to be very distinct, yet simple.”

Though the design was replaced in 1987, it staged a massive comeback around 2009 with the rise of smartphones. The limited screen real estate of these new pocket-sized computers made the hamburger menu's ability to maximize space invaluable, cementing its role in today's digital landscape.

The Pros

The hamburger menu's success is rooted in its inherent advantages, especially for mobile optimization:

  • Space efficiency - This is the primary driver. On a small screen, there's simply no room for a fully spelled-out navigation bar like: Home | About | Services | Contact. The hamburger icon offers a single, non-distracting button that neatly houses all your links.
  • Improved user experience - By simplifying the visual design, the hamburger menu minimizes cognitive load. Users are presented with a clean interface dedicated to the content, and when they need to navigate, a well-organized drop-down is easier to scan than a crowded top bar.
  • Improved marketing - Fewer distractions mean more focus on your core message. Tucking away the navigation frees up crucial above-the-fold space for compelling headlines, engaging visuals, and clear calls-to-action (CTAs).

The Cons

While efficient, this design approach isn't without its potential pitfalls, largely because hidden content is sometimes forgotten content:

  • Increased user friction - Hiding the menu means adding an extra click. Instead of a one-click action, a user must click the icon then click the desired page. If your navigation isn't immediately obvious or easy to find, you risk frustrating visitors and increasing your bounce rate.
  • Visibility vs. concealment - You must carefully decide which pages are important enough to live outside the menu. Pages that are vital to your business may suffer from decreased visibility if they are exclusively hidden inside the hamburger icon.

To mitigate the cons, ensure your most crucial, high-value pages are accessible via links on the homepage or through a complementary, always-visible navigation element like a bottom bar.

The hamburger menu is a powerhouse of efficiency, especially on mobile, but it requires strategic implementation. Its simple three-line design is far more complex than it looks, demanding that you strike a delicate balance between a clean interface and immediate content accessibility.

Check back in this space regularly to read more about today’s business technology.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Managed Services Vendor Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Storage Password Bring Your Own Device Big Data 2FA Operating System Healthcare Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation Excel Going Green Patch Management Save Money Remote Monitoring Vulnerability Remote Workers End of Support Vendor Management Customer Service Cybercrime Display Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Monitoring Microsoft 365 Solutions Firewall Document Management Managed IT Service Maintenance Safety Antivirus Sports Downloads Mouse Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management iPhone Presentation VPN YouTube Meetings Cryptocurrency Vulnerabilities Wireless Technology User Tip Modem Computer Repair Mobile Security Data Privacy Processor Virtual Desktop Images 101 LiFi Data storage Mobility Multi-Factor Authentication Smart Technology Word Outlook Machine Learning Money Saving Time Humor Employees Integration Deep Learning Download Twitter Alerts Managing Costs Amazon eCommerce SSID Undo Error Social Engineering Break Fix Surveillance Virtual Assistant Outsource IT Browsers Education Connectivity Media Upload Remote Computing Virtual Machine Environment Medical IT Mobile Computing Social Network Reviews Multi-Factor Security Search Dark Web Development Transportation Small Businesses Tablet IoT Application Best Practice Trends Alert Hypervisor Displays Optimization PowerPoint Managed IT Customer Resource management Buisness File Sharing Regulations Shopping Dark Data Google Calendar How To Microsoft Excel Employer/Employee Relationships Outsourcing IBM Legal Data Analysis IT solutions Star Wars Navigation Business Growth Gamification Notifications Staff PCI DSS Workplace Travel Social Networking Gig Economy Legislation Cortana Internet Service Provider Teamwork Hiring/Firing Techology Fileless Malware Google Maps Evernote Paperless Alt Codes Content Wearable Technology Regulations Compliance Memes Co-managed IT Competition Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Net Neutrality SQL Server Technology Care Unified Threat Management Directions Hosted Solution Assessment Business Communications Typing Financial Data History IT Scams Smartwatch Network Congestion Specifications Knowledge Fraud Procurement Azure Hybrid Work Google Drive User Error Microchip User Internet Exlporer Tech Human Resources Username Telework Cyber security Communitications Cables Point of Sale CES 5G Black Friday Experience Supply Chain Management IP Address Google Docs Unified Communications Database Term Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians FinTech IT Assessment IT Maintenance Google Wallet Proxy Server Cookies Monitors Cyber Monday Recovery Tactics Hotspot Flexibility Value Business Intelligence Shortcuts Hard Drives Windows 8 Laptop Websites Mirgation Organization Smart Devices Ransmoware Domains Drones Nanotechnology Digital Security Cameras Addiction Electronic Medical Records Language Remote Working Memory Vendors SharePoint Google Play Be Proactive Refrigeration Management Halloween Chatbots Data Breach Writing Distributed Denial of Service Electronic Health Records Workforce Public Speaking Lenovo Screen Reader Videos Service Level Agreement Virtual Reality Computing Infrastructure Wasting Time Threats Lithium-ion battery Security Cameras Workplace Strategies Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Trend Micro Fun Software as a Service Meta Superfish Bookmark Identity Theft Smart Tech

Blog Archive