2014 QNet Open – Singles
The tournament in New Delhi was a new addition to the ITF Women's Circuit.
Singles | |
---|---|
2014 QNet Open | |
Champion | ![]() |
Runner-up | ![]() |
Final score | 6–2, 6–2 |
Ivana Jorović won the title, defeating Barbara Haas in the final, 6–2, 6–2.
Seeds
Patricia Mayr-Achleitner (Quarterfinals) Anastasiya Vasylyeva (Semifinals) Marina Melnikova (Quarterfinals) Tadeja Majerič (First round)Susanne Celik(Withdrew) Sabina Sharipova (Quarterfinals) Elise Mertens (Semifinals) Sofiya Kovalets (First round)
Main draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Finals
Semifinals | Final | ||||||||||||
![]() | 6 | 4 | 6 | ||||||||||
7 | ![]() | 4 | 6 | 1 | |||||||||
![]() | 2 | 2 | |||||||||||
![]() | 6 | 6 | |||||||||||
![]() | 4 | 6 | 6 | ||||||||||
2 | ![]() | 6 | 3 | 2 | |||||||||
Top half
First round | Second round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
1 | ![]() | 6 | 6 | ||||||||||||||||||||||||
![]() | 2 | 3 | 1 | ![]() | 6 | 6 | |||||||||||||||||||||
![]() | 5 | 3 | ![]() | 4 | 3 | ||||||||||||||||||||||
![]() | 7 | 6 | 1 | ![]() | 3 | 63 | |||||||||||||||||||||
![]() | 4 | 0 | ![]() | 6 | 77 | ||||||||||||||||||||||
![]() | 6 | 6 | ![]() | 6 | 4 | 0r | |||||||||||||||||||||
![]() | 0 | 78 | 7 | ![]() | 3 | 6 | 2 | ||||||||||||||||||||
8 | ![]() | 6 | 66 | 5 | ![]() | 6 | 4 | 6 | |||||||||||||||||||
3 | ![]() | 4 | 6 | 6 | 7 | ![]() | 4 | 6 | 1 | ||||||||||||||||||
Q | ![]() | 6 | 3 | 3 | 3 | ![]() | 6 | 6 | |||||||||||||||||||
![]() | 6 | 6 | ![]() | 4 | 4 | ||||||||||||||||||||||
![]() | 2 | 2 | 3 | ![]() | 6 | 5 | 2 | ||||||||||||||||||||
WC | ![]() | 1 | 3 | 7 | ![]() | 3 | 7 | 6 | |||||||||||||||||||
![]() | 6 | 6 | ![]() | 3 | 1 | ||||||||||||||||||||||
Q | ![]() | 0 | 1 | 7 | ![]() | 6 | 6 | ||||||||||||||||||||
7 | ![]() | 6 | 6 |
Bottom half
First round | Second round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
LL | ![]() | 2 | 1 | ||||||||||||||||||||||||
![]() | 6 | 6 | ![]() | 4 | 6 | 6 | |||||||||||||||||||||
Q | ![]() | 6 | 6 | Q | ![]() | 6 | 0 | 1 | |||||||||||||||||||
Q | ![]() | 2 | 0 | ![]() | 63 | 0 | |||||||||||||||||||||
![]() | 6 | 6 | ![]() | 77 | 6 | ||||||||||||||||||||||
![]() | 3 | 3 | ![]() | 5 | 2 | ||||||||||||||||||||||
![]() | 7 | 6 | ![]() | 7 | 6 | ||||||||||||||||||||||
4 | ![]() | 5 | 0 | ![]() | 4 | 6 | 6 | ||||||||||||||||||||
6 | ![]() | 6 | 6 | 2 | ![]() | 6 | 3 | 2 | |||||||||||||||||||
![]() | 2 | 1 | 6 | ![]() | 3 | 6 | 77 | ||||||||||||||||||||
![]() | 63 | 1 | ![]() | 6 | 4 | 62 | |||||||||||||||||||||
![]() | 77 | 6 | 6 | ![]() | 3 | 4 | |||||||||||||||||||||
WC | ![]() | 6 | 6 | 2 | ![]() | 6 | 6 | ||||||||||||||||||||
WC | ![]() | 4 | 2 | WC | ![]() | 2 | 4 | ||||||||||||||||||||
WC | ![]() | 3 | 65 | 2 | ![]() | 6 | 6 | ||||||||||||||||||||
2 | ![]() | 6 | 77 |
gollark: Or decrypt or whatever.
gollark: I think part of the idea of "trusted computing" is to put a secret key on a chip somewhere so it can attest that you're using your computer as Microsoft intended and refuse to sign stuff otherwise.
gollark: Not to stop you screenshotting copyrighted content or something.
gollark: But yes, I don't think it's a very good solution because the purpose of security should ultimately be to protect users.
gollark: If the only way to improve security requires not actually controlling hardware I own I'll just stick with not doing that.
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.