Polystyrene-Supported Benzenesulfonyl Azide: A Diazo Transfer Reagent That Is Both Efficient and Safe.
نویسندگان
چکیده
منابع مشابه
Tributylstannyl Azide as Efficient Reagent in the Synthesis of Aryl
An efficient and straightforward method for one-pot synthesis of aryl azides from the corresponding amines, employing tributylstannyl azide as transfer reagent of N3 group is described. In this procedure diazotization of aryl amines occurs under mild conditions using tert-butyl nitrite (t-BuONO) and p-toluenesulfonic acid (TsOH). A variety of substituted aryl amines, with both electron-withdraw...
متن کاملOne-step bioengineering of magnetic nanoparticles via a surface diazo transfer/azide-alkyne click reaction sequence.
We have developed an efficient conversion of amino iron oxides to carbohydrate and protein derived nanoparticles with highly conserved bioactivity through a combination of diazo transfer and azide-alkyne click technology.
متن کاملTaming tosyl azide: the development of a scalable continuous diazo transfer process.
Heat and shock sensitive tosyl azide was generated and used on demand in a telescoped diazo transfer process. Small quantities of tosyl azide were accessed in a 'one pot' batch procedure using shelf stable, readily available reagents. For large scale diazo transfer reactions tosyl azide was generated and used in a telescoped flow process, to mitigate the risks associated with handling potential...
متن کاملOne-pot procedure for diazo transfer and azide-alkyne cycloaddition: triazole linkages from amines.
[reaction: see text] A one-pot reaction for Cu(II)-catalyzed diazo transfer and Cu(I)-catalyzed azide-alkyne 1,3-dipolar cycloaddition (sometimes called click reaction) is reported. 1,4-Disubstituted 1,2,3-triazoles are obtained in excellent yields from a variety of readily available amines without the need for isolation of the azide intermediates. The reaction has a broad scope and is especial...
متن کاملMaking Mobile Code Both Safe And Efficient
Mobile programs can potentially be malicious. To protect itself, a host that receives such mobile programs from an untrusted party or via an untrusted network connection will want some kind of guarantee that the mobile code is not about to cause any damage. The traditional solution to this problem has been verification, by which the receiving host examines the mobile program to discover all its...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Organic Chemistry
سال: 2001
ISSN: 0022-3263,1520-6904
DOI: 10.1021/jo015939x