Edge template VI1a
Template VI1-a is a 6th row edge template with one stone.
This template is the first one stone 6th row template for which a proof of validity has been written out. The template has been verified by computer, and also verified to be minimal.
Contents
Elimination of irrelevant Blue moves
Red has a number of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers.
Edge template IV1a
Edge template IV1b
Using Tom's move
6 intrusions can furthermore be discarded thanks to Tom's move, also known as the parallel ladder trick. Of course, symmetry will cut our work in half!
If Blue moves in any of the cells marked "1" on the left (and, using mirror symmetry, in the corresponding 3 cells on the right), Red can respond as follows:
At this point, Red can use Tom's move to connect:
Remaining intrusions
The only possible remaining intrusions for Blue are the following:
By symmetry, if is sufficient to consider the six possible intrusions at a – f.
Specific defense
For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions!
Intrusion at a
If Blue intrudes at a, Red has several winning responses. For example, Red can play at 2:
Apart from intrusion into the bridge, which Red defends, Blue's only possible moves are at x and y. If Blue plays at x, Red can set up a parallel ladder and connect using Tom's move.
If Blue plays at y, Red has the following simple win, using the trapezoid template:
Intrusion at b
If Blue intrudes at b, Red can respond at 2:
Apart from intrusions into the bridge, which Red defends, Blue has only four possible moves x,y,z,w, because if Blue moves anywhere else, Red connects with either the ziggurat or edge template III1b.
If Blue intrudes at x, Red can set up a parallel ladder and connect using Tom's move:
If Blue intrudes at y or z (both shown simultaneously in the following diagram), Red can set up Tom's move on the opposite side:
Finally, if Blue intrudes at w, Red can connect by the following variant of Tom's move:
Intrusion at c
Red may play here:
Note that if Red plays at c, then in the blue area both Red 2 and c connect down without choice, unless Blue first plays at d. Also, the paths for 2 connecting down would not pass c or d. Therefore, Blue must spend one move at either a,b,c or d in order to block Red on the right side, while Red 2 is always guaranteed to connect down. Thus we have this forcing sequence:
(Assume that Blue 3 is played at either a,b,c or d, and there were no extra turns in the blue area.)
Intrusion at d
Red may go here:
Details to follow. See more details here.
Intrusion at e
Red should move here (or the equivalent mirror-image move at "+"):
Now the shaded area is a ladder creation template, giving Red at least a 3rd row ladder as indicated.
Red can escape both 2nd and 3rd row ladders using a ladder escape fork via "+". Specifically, Red escapes a third row ladder like this, and is connected by a ziggurat and double threat at "+":
If Blue yields, or Red starts out with a 2nd row ladder, the escape fork works anyway:
Intrusion at f
First establish a parallel ladder on the right.
Then use Tom's move:
There are two marginal cases. If Blue 3 blocks at a or b, then Red 4 can reduce the situation to "Intrusion at a or b", as intruding the vertical bridge is irrelevant in this two cases.