2012 Bauer Watertechnology Cup – Doubles

Andre Begemann and Alexander Kudryavtsev were the defending champions but Kudryavtsev decided not to participate.
Begemann played alongside Martin Emmrich.
James Cerretani and Adil Shamasdin won the title, defeating Tomasz Bednarek and Andreas Siljeström 6–3, 2–6, [10–4] in the final.

Doubles
2012 Bauer Watertechnology Cup
Champions James Cerretani
Adil Shamasdin
Runners-up Tomasz Bednarek
Andreas Siljeström
Final score6–3, 2–6, [10–4]

Seeds

Draw

Key

Draw

First Round Quarterfinals Semifinals Final
1 A Begemann
M Emmrich
6 6  
WC Kirill Dmitriev
Alexey Vatutin
0 3   1 A Begemann
M Emmrich
79 64 [5]
  G Naso
M Viola
3 2     A Juška
P Oswald
67 77 [10]
  A Juška
P Oswald
6 6     A Juška
P Oswald
77 2 [6]
3 T Bednarek
A Siljeström
6 6   3 T Bednarek
A Siljeström
65 6 [10]
  É Chvojka
J Cluskey
4 2   3 T Bednarek
A Siljeström
6 6  
  U Ignatik
O Nedovyesov
77 7     U Ignatik
O Nedovyesov
3 2  
  R Albot
D Matsukevitch
61 5   3 T Bednarek
A Siljeström
3 6 [4]
  D Brands
D Brown
4 77 [6] 2 J Cerretani
A Shamasdin
6 2 [10]
Alt Adham El-Effendi
Darren Walsh
6 65 [10] Alt A El-Effendi
D Walsh
1 4  
  R Junaid
D Meffert
3 65   4 L Dlouhý
A Olivetti
6 6  
4 L Dlouhý
A Olivetti
6 77   4 L Dlouhý
A Olivetti
6 65 [8]
WC K Krawietz
Maximilian Marterer
4 6 [6] 2 J Cerretani
A Shamasdin
1 77 [10]
WC N Langer
J-L Struff
6 3 [10] WC N Langer
J-L Struff
2 3  
  J Mertl
I Minář
4 4   2 J Cerretani
A Shamasdin
6 6  
2 J Cerretani
A Shamasdin
6 6  
gollark: Yes, you have complained about how people might not take vulnerability reports seriously, but that is not an excuse to just not make any.
gollark: But deliberately hoarding vulnerabilities is an active threat to the security of everything.
gollark: I mean, not releasing your software is... your choice, it's your stuff, I might not really like it but I don't consider it particularly bees.
gollark: !quote 723983650043199568
gollark: If you have useful, popular tools you can probably get PRs for them, and it saves people working in the same field from just implementing their own versions.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.