2016 Nürnberger Versicherungscup – Doubles
Chan Hao-ching and Anabel Medina Garrigues were the defending champions, but Chan chose not to participate this year and Medina Garrigues chose to compete in Strasbourg instead.
Kiki Bertens and Johanna Larsson won the title, defeating Shuko Aoyama and Renata Voráčová in the final, 6–3, 6–4.
Doubles | |
---|---|
2016 Nürnberger Versicherungscup | |
Champion | |
Runner-up | |
Final score | 6–3, 6–4 |
Seeds
Kiki Bertens / Johanna Larsson (Champions) Oksana Kalashnikova / Tatjana Maria (Quarterfinals) Raluca Olaru / Stephanie Vogt (First round) Vera Dushevina / Anastasia Rodionova (First round)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
First Round | Quarterfinals | Semifinals | Final | ||||||||||||||||||||||||
1 | 6 | 6 | |||||||||||||||||||||||||
0 | 0 | 1 | 6 | 4 | [10] | ||||||||||||||||||||||
6 | 77 | 3 | 6 | [3] | |||||||||||||||||||||||
2 | 64 | 1 | w/o | ||||||||||||||||||||||||
4 | 6 | 3 | [4] | ||||||||||||||||||||||||
3 | 6 | [10] | 0 | 4 | |||||||||||||||||||||||
6 | 3 | [10] | 6 | 6 | |||||||||||||||||||||||
WC | 3 | 6 | [5] | 1 | 6 | 6 | |||||||||||||||||||||
6 | 6 | 3 | 4 | ||||||||||||||||||||||||
WC | 2 | 2 | 3 | 5 | |||||||||||||||||||||||
6 | 6 | 6 | 7 | ||||||||||||||||||||||||
3 | 3 | 3 | 4 | 6 | [12] | ||||||||||||||||||||||
6 | 6 | 6 | 2 | [10] | |||||||||||||||||||||||
2 | 3 | 6 | 2 | [10] | |||||||||||||||||||||||
66 | 77 | [8] | 2 | 4 | 6 | [5] | |||||||||||||||||||||
2 | 78 | 64 | [10] |
gollark: Now to reverse-DNS your IP using AAC, compress the ethernet AGP bus, and DFPWMify the subdirectories, so I can use the path now opened to your computer to hackerize it.
gollark: Oh, fun idea, PotatOS could have a logging mechanism and decent IPC thing.
gollark: A few things to look for might be... bytecode, I guess, keywords like "payload", "uninstall", some process IDs as 6_4 suggested, hmm, what else.
gollark: That might be good.
gollark: I'm wondering how to detect exploit-looking code now. This is probably a Hard Problem.
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.