2015 Irving Tennis Classic – Doubles

Santiago González and Scott Lipsky were the defending champions, but González did not participate. Lipsky partnered with Treat Huey, but lost in the quarterfinals to Pablo Andújar and Diego Schwartzman.

Doubles
2015 Irving Tennis Classic
Champions Robert Lindstedt
Sergiy Stakhovsky
Runners-up Benjamin Becker
Philipp Petzschner
Final score6–4, 6–4

Seeds

  1. Mariusz Fyrstenberg / David Marrero (First Round)
  2. Eric Butorac / Rajeev Ram (First Round)
  3. Treat Huey / Scott Lipsky (Quarterfinals)
  4. Johan Brunström / Nicholas Monroe (First Round)

Draw

Key

First Round Quarterfinals Semifinals Final
1 M Fyrstenberg
D Marrero
2 4
D Kudla
A Rublev
6 6 D Kudla
A Rublev
D Brown
J-L Struff
3 6 [7] A Bedene
D Džumhur
w/o
A Bedene
D Džumhur
6 3 [10] A Bedene
D Džumhur
2 2
4 J Brunström
N Monroe
2 1 R Lindstedt
S Stakhovsky
6 6
G Müller
A-u-H Qureshi
6 6 G Müller
A-u-H Qureshi
63 62
R Lindstedt
S Stakhovsky
6 6 R Lindstedt
S Stakhovsky
77 77
WC Nate Eazor
Chase Wood
0 2 R Lindstedt
S Stakhovsky
6 6
WC Alex Pier
M Russell
2 1 B Becker
P Petzschner
4 4
P Andújar
D Schwartzman
6 6 P Andújar
D Schwartzman
6 6
T Bellucci
A Siljeström
4 66 3 T Huey
S Lipsky
4 2
3 T Huey
S Lipsky
6 78 P Andújar
D Schwartzman
2 0
K Edmund
J Ward
6 1 [10] B Becker
P Petzschner
6 6
WC Hunter Johnson
Yates Johnson
4 6 [7] K Edmund
J Ward
B Becker
P Petzschner
66 77 [10] B Becker
P Petzschner
w/o
2 E Butorac
R Ram
78 65 [6]
gollark: This should actually be less disruptive than I thought, I can just isolate the privileged stuff in a separate polychoron process instead of just shutting down all user code.
gollark: What is, the evil exploit someone made?
gollark: It's a very clever exploit - they load some trusted code via PotatOS Privileged Execution™, then send it fake HTTP responses containing code.
gollark: I've probably patched it now (hard to test, because one of my changes broke the exploit code but in a way which could be worked around), but at the cost of causing minor breakage in a mostly unused feature.
gollark: I'm having to reverse-engineer yet ANOTHER heavily obfuscated potatOS sandbox exploit.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.