Feeds

Doctor Who? 12th incarnation sought after Matt Smith quits

'Spectacular exit' promised for Time Lord

High performance access to file storage

Matt Smith has announced he'll be handing over the keys to the Tardis at the end of this year, leaving Doctor Who fans plenty of time to speculate over just who will step into the Time Lord's shoes.

Smith will bow out in a "spectacular" 2013 Christmas special, after four years as the 11th Doctor.

He said: "Doctor Who has been the most brilliant experience for me as an actor and a bloke, and that largely is down to the cast, crew and fans of the show.

"I'm incredibly grateful to all the cast and crew who work tirelessly every day to realise all the elements of the show and deliver Doctor Who to the audience. Many of them have become good friends and I'm incredibly proud of what we have achieved over the last four years."

Doctor Who head honcho Steven Moffat described Smith as "one of the nicest and hardest-working people I have ever had the privilege of knowing", adding: "Great actors always know when it's time for the curtain call, so this Christmas prepare for your hearts to break as we say goodbye to number 11. Thank you Matt - bow ties were never cooler."

If your nerves can stand it, there's more of this love-in right here.

Amid the back-slapping, Moffat said of Smith's replacement: "Somewhere out there right now - all unknowing, just going about their business - is someone who's about to become the Doctor. A life is going to change, and Doctor Who will be born all over again. After 50 years, that's still so exciting."

Bookies William Hill have named "former Harry Potter star Rupert Grint and Russell Tovey from BBC Three's Being Human as their joint 10/1 favourites to named the next Doctor", the Beeb notes.

It adds: "They are also offering odds on Sherlock star Martin Freeman, on Skyfall's Ben Whishaw and on former assistant Billie Piper returning to the series as the Doctor's new incarnation."

Piper joins "Twenty Twelve and Broadchurch star Olivia Colman and Fiona O'Shaughnessy from Channel 4 drama Utopia" on the list for a possible gender-bending reincarnation. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.