2016 Nürnberger Versicherungscup – Doubles

Chan Hao-ching and Anabel Medina Garrigues were the defending champions, but Chan chose not to participate this year and Medina Garrigues chose to compete in Strasbourg instead.
Kiki Bertens and Johanna Larsson won the title, defeating Shuko Aoyama and Renata Voráčová in the final, 6–3, 6–4.

Doubles
2016 Nürnberger Versicherungscup
Champion Kiki Bertens
Johanna Larsson
Runner-up Shuko Aoyama
Renata Voráčová
Final score6–3, 6–4

Seeds

  1. Kiki Bertens / Johanna Larsson (Champions)
  2. Oksana Kalashnikova / Tatjana Maria (Quarterfinals)
  3. Raluca Olaru / Stephanie Vogt (First round)
  4. Vera Dushevina / Anastasia Rodionova (First round)

Draw

Key

First Round Quarterfinals Semifinals Final
1 K Bertens
J Larsson
6 6
J Moore
V Wongteanchai
0 0 1 K Bertens
J Larsson
6 4 [10]
C Daniels
L Marozava
6 77 C Daniels
L Marozava
3 6 [3]
T Moore
C Perrin
2 64 1 K Bertens
J Larsson
w/o
4 V Dushevina
An Rodionova
6 3 [4] A Beck
A-L Friedsam
C-w Chan
D Schuurs
3 6 [10] C-w Chan
D Schuurs
0 4
A Beck
A-L Friedsam
6 3 [10] A Beck
A-L Friedsam
6 6
WC K Hobgarski
C Witthöft
3 6 [5] 1 K Bertens
J Larsson
6 6
A-L Grönefeld
K Peschke
6 6 S Aoyama
R Voráčová
3 4
WC S Klemenschits
A Lottner
2 2 A-L Grönefeld
K Peschke
3 5
S Aoyama
R Voráčová
6 6 S Aoyama
R Voráčová
6 7
3 R Olaru
S Vogt
3 3 S Aoyama
R Voráčová
4 6 [12]
N Dzalamidze
V Kudermetova
6 6 N Dzalamidze
V Kudermetova
6 2 [10]
N Hibino
L Pigossi
2 3 N Dzalamidze
V Kudermetova
6 2 [10]
V Ivakhnenko
M Melnikova
66 77 [8] 2 O Kalashnikova
T Maria
4 6 [5]
2 O Kalashnikova
T Maria
78 64 [10]
gollark: Now to reverse-DNS your IP using AAC, compress the ethernet AGP bus, and DFPWMify the subdirectories, so I can use the path now opened to your computer to hackerize it.
gollark: Oh, fun idea, PotatOS could have a logging mechanism and decent IPC thing.
gollark: A few things to look for might be... bytecode, I guess, keywords like "payload", "uninstall", some process IDs as 6_4 suggested, hmm, what else.
gollark: That might be good.
gollark: I'm wondering how to detect exploit-looking code now. This is probably a Hard Problem.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.