Banner for the AMS Feature Column

The nuts and bolts of what I do when thinking about math are very similar to the nuts and bolts of thinking about a policy problem… Math Meets Congress Or, A Mathematician Goes to Washington Courtney Gibbons Hamilton College Thanks to the American Association for the Advancement of Science andRead More →

Banner for the AMS Feature Column

One of the fundamental forces in the universe is the weak force. The weak force is involved in holding atoms together or breaking them apart... Putting a period on mathematical physics Ursula Whitcher Mathematical Reviews (AMS) You've heard of periods at the ends of sentences and periods of sine waves.Read More →

Banner for the AMS Feature Column

If one has a pattern on a band, frieze, or strip (disregarding color if as often happens more than one color appears), regardless of the artistic content of what one sees, there are exactly 7 different patterns that are possible… Remembering Donald W. Crowe Maker of Connections between Symmetry, ArtRead More →

Banner for the AMS Feature Column

Polynomials, it turns out, are useful for more than just input-output assignments! Perspectives on Polynomials (it’s a witch!) Courtney Gibbons Hamilton College It was a dark and stormy night… Okay, it was probably more like 3:30 in the afternoon on a crisp fall day back when I was teaching CalcRead More →

Banner for the AMS Feature Column

I would like to discuss the Jordan curve theorem as part of an intrinsic human activity: storytelling. The Jordan Curve Theorem as a Lusona Allechar Serrano López Harvard University Introduction The Jordan curve theorem is a result in topology that states that every Jordan curve (a plane simple closed curve)Read More →

Banner for the AMS Feature Column

Mathematically, the most intriguing of the new proposals use lattices for message encryption… What will they do when quantum computers start working? Bill Casselman University of British Columbia Commercial transactions on the internet are invariably passed through a process that hides them from unauthorized parties, using RSA public key encryptionRead More →