Feeds

PUNISHMENT gluttons: The Dr Who monsters that come back for more

Data Visualisation: The Doctor’s most commonly returning foes

Business security measures using SSL

Doctor Who @ 50 Given the Doctor’s propensity for making enemies, he has faced relatively few more than twice. This is perhaps not surprising for someone who can travel anywhere in the whole history of the entire universe – the chances of bumping into someone again should be low.

But the demands of making an adventure TV series mean return matches with popular adversaries are inevitable. It surely follows that more than one showing up in a story would be even more popular, and if they were actually working together against the Doctor, well, he'd have no chance, would he?

This chart shows the story links between major returning foes. Adversaries are included if they’ve appeared in three or more stories. The outer ring is proportional to each race’s number of appearances, clockwise in the order in which they first appeared. Stories are counted if they include newly recorded material, not just past clips or photographs.

Incidentally, ‘Time Lords’ counts any story in which a Gallifreyan other than the Doctor, Romana or the Master appeared. Not all races were villainous in every story but they are counted anyway.

The coloured links indicate appearances by more than one of these monsters in the same story. These may be in unconnected scenes or as a unified force.

Doctor Who: The Enemies

Click to see the visualisation full size
Source: Wonderful Books

The story with the most recurring enemies is, not surprisingly, The Pandorica Opens, in which the Daleks, Cybermen, Autons, Silurians, Sontarans and Judoon join many other one-off races in an alliance against the Doctor to prevent him, they believe, from destroying the universe.

The Five Doctors features five recurring adversaries, each transported to the Gallifreyan Death Zone to battle the Doctor on his birthday, as does The War Games, thanks to the Doctor’s defence plea that all the nasty creatures in the universe need to be put in their place.

There are four major monster appearances in A Good Man Goes to War, although the Cybermen were not involved with the others, who were actually fighting on the Doctor’s side for once.

The Weeping Angels are the only enemy to have appeared more than twice but never in a story with any other. ®

The image comes from Time & Space Visualiser: The Story and History of Doctor Who as Data Visualisations by Paul Smith, published by Wonderful Books and available through Amazon UK and Amazon US.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
DARPA-backed jetpack prototype built to make soldiers run faster
4 Minute Mile project hatched to speed up tired troops
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Apple's ONE LESS THING: the iPod Classic disappears
RIP 2001 – 2014. MP3 player beloved of millions. Killed by cloud
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.