Feeds

PUNISHMENT gluttons: The Dr Who monsters that come back for more

Data Visualisation: The Doctor’s most commonly returning foes

3 Big data security analytics techniques

Doctor Who @ 50 Given the Doctor’s propensity for making enemies, he has faced relatively few more than twice. This is perhaps not surprising for someone who can travel anywhere in the whole history of the entire universe – the chances of bumping into someone again should be low.

But the demands of making an adventure TV series mean return matches with popular adversaries are inevitable. It surely follows that more than one showing up in a story would be even more popular, and if they were actually working together against the Doctor, well, he'd have no chance, would he?

This chart shows the story links between major returning foes. Adversaries are included if they’ve appeared in three or more stories. The outer ring is proportional to each race’s number of appearances, clockwise in the order in which they first appeared. Stories are counted if they include newly recorded material, not just past clips or photographs.

Incidentally, ‘Time Lords’ counts any story in which a Gallifreyan other than the Doctor, Romana or the Master appeared. Not all races were villainous in every story but they are counted anyway.

The coloured links indicate appearances by more than one of these monsters in the same story. These may be in unconnected scenes or as a unified force.

Doctor Who: The Enemies

Click to see the visualisation full size
Source: Wonderful Books

The story with the most recurring enemies is, not surprisingly, The Pandorica Opens, in which the Daleks, Cybermen, Autons, Silurians, Sontarans and Judoon join many other one-off races in an alliance against the Doctor to prevent him, they believe, from destroying the universe.

The Five Doctors features five recurring adversaries, each transported to the Gallifreyan Death Zone to battle the Doctor on his birthday, as does The War Games, thanks to the Doctor’s defence plea that all the nasty creatures in the universe need to be put in their place.

There are four major monster appearances in A Good Man Goes to War, although the Cybermen were not involved with the others, who were actually fighting on the Doctor’s side for once.

The Weeping Angels are the only enemy to have appeared more than twice but never in a story with any other. ®

The image comes from Time & Space Visualiser: The Story and History of Doctor Who as Data Visualisations by Paul Smith, published by Wonderful Books and available through Amazon UK and Amazon US.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.