Feeds

Bucket? Check. Toilet plunger? Check. El Reg's 50 years of Doctor Who

One Time Lord, one month, five decades

SANS - Survey on application security programs

Doctor Who @ 50 Fifty years ago in November – on November 23, to be precise – the BBC broadcast its first episode of Doctor Who. It was the start of what, in the world of JJ Abrams, we’d call “a franchise”.

Just two TV programs have matched the Doctor for endurance and survival: Coronation Street and Blue Peter.

In five decades the Doctor’s been played by 11 actors - even more thesps have played his companions.

While the names have changed, the Doctor hasn’t. To quote Tom Baker's Fourth Doctor: “You may be a doctor, but I’m THE doctor. The definite article, you might say.”

What’s the secret to the Doctor’s power?

Great writing from, among others, Hitchhikers’ Guide to the Galaxy man Douglas Adams and graphic novelist Neil Gaiman.

Every hero has a nemesis and the Doctor has plenty – robots, cyborgs, madmen and disembodied and vengeful alien forces bent on galactic destruction.

There are the assistants, too – some of whom have maintained a somewhat edgy and suggestive relationship with the Doctor over the years.

All this has seen the Doctor go beyond TV with merchandising, live shows and a shameless BBC TV "event" to unveil the next actor to play the Time Lord.

Not that the Doctor’s survival has been assured. Indeed, it’s a miracle he’s survived this long - not that you’d guess it from the BBC’s hagiographic coverage.

That first episode in 1963 was eclipsed by the assassination of US president John F Kennedy in Dallas, Texas. So worried were the Beeb by its viewers’ potential inability to process more than one televisual event they re-broadcast the pilot. Then the BBC ended the Doctor’s run in 1989 and – apart from his brief appearance in a 1996 film – it wasn’t until 2005 when he returned with the power trio of Russell T Davies, Christopher Eccleston and Billie Piper to a new generation.

With the 50th anniversary of Register readers' favourite Time Lord coming up, we're marking the occasion with a series of special features for the next month. Among the line up:

  • Building your own sonic screw driver with Bill Ray
  • Not just time but space - have you got the right stuff to fly to Mars?
  • The best (and darkest) Doctor Who episodes, ever
  • Evolution of the Doctor from Edwardian grump to Malcolm Tucker cuss bucket
  • Time travel the easy way. (We lied, there is no easy way)
  • K9, heel! Human robot companions for non-Time Lords
  • The story of the Australian Who fans' "riot"

So put a bucket on your head, grab the nearest toiler plunger and let forth the cry: EXTERMINATE! EXTERMINATE! ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.