Technology has always been a fast moving industry, with the need to innovate and create new and better products being the lifeblood of many businesses profits.
As a result, joining V3 as a bushy tailed reporter tasked to cover the device and security beats three years ago I expected to be fairly busy each day.
However, even partially knowing what I was in for, nothing could have prepared me for the sheer volume of game-changing events that would transpire over the next 1,095 days.
In my time covering tech for V3 I've seen fundamental, and in my mind positive, shifts in the way we not only use but regard technology and security.
The changing attitude many users and businesses take regarding Apple devices and services is a good example of this.
When I first started there was an ongoing belief outside of the technology industry that Apple products are secure by design and cannot be hacked using traditional means - a belief I hadn't given much thought.
Within a week of starting however this idea was broken with the arrival of the infamous Flashback bug.
The BackDoor.Flashback.39, Flashback was originally unearthed targeting Mac computers in April 2012 and is regarded as one of the worst and most dangerous cyber criminal campaigns ever mounted.
This is largely down to its undeniable success rate, with Flashback still being estimated to have successfully infected over 600,000 Mac computers by targeting a then unpatched Java vulnerability within Apple's Mac operating system.
The journey to awareness regarding product security continued when criminals successfully stole, and published, a number of naked celebrity photos stolen from iCloud accounts.
While Apple maintained it wasn't a "hack", claiming it was the victims' fault for not having two-factor authentication - classy move there Apple - the news again had a positive educational effect, leading many business and personal smartphone users to consider the security implications of cloud services.
This trend was aided by other developments not specific to Apple, the worst of which was the notorious PRISM leak.
The PRISM saga began in 2013 when whistleblower Edward Snowden leaked documents to the press detailing mass surveillance campaigns being run by the US NSA and UK GCHQ.
These have ranged from mass customer data collection from tech companies such as Google, Microsoft, Facebook, Yahoo and Twitter, to 'legal' phone hacking operations using bogus signal towers.
While terrifying, the news has had one positive effect. Like the Apple issues, PRISM has raised general awareness about privacy and security, and made people and businesses start openly asking questions they should have raised years ago.
This has been showcased by positive steps companies named and shamed in Snowden's leaks have taken in their bid to win back customer trust.
Since the PRISM leaks, companies including Google and Facebook have been taking steps to encrypt their services and be more transparent about what data they collect and how they use it.
Considering the next wave of industry changing developments set to arrive in the next three years, which include widespread adoption of The Internet of Things technologies, like wearables and connected cities, the move towards transparency and secure by design products is in my mind an essential move all businesses must take.
What I am less sure about is whether businesses will be able to continue their positive work.
Since the PRISM leaks, governments and law enforcement agencies have expressed either concern, or outright hostility, to the move towards privacy and security by businesses and general web users.
Specifically, experts from Europol, the NCA and FBI have argued PRISM-level data collection and the ability to access businesses' customer data is a necessary evil in the fight against criminal and terrorist groups.
In turn, the US and UK governments have debated new legislation that would grant intelligence agencies yet more surveillance powers and ways to get round the encryption roadblock and undo the positive work many technology companies have done post-PRISM.
For me, fighting governments' protectionist and backwards thinking security policies will be the big battle for the technology industry over the next three years - one they thankfully have already begun fighting.
With my time at V3 now ending, I wanted to use my last column wishing those fighting on the side of digital privacy luck in their fight on mass surveillance.
We sacrificed our weekend to try out the new Vikendi map coming to PUBG - and rather liked it
12 of the 32 stars observed feature rings and gaps that are usually carved by planets in the process of formation
The experiment is currently underway at South Korea's Yangyang Underground Laboratory
Exoplanet HAT-P-11b is located about 124 light years from Earth