/* https://github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers */ @font-face { font-family: "Computer Modern"; src: url('http://mirrors.ctan.org/fonts/cm-unicode/fonts/otf/cmunss.otf'); } div.cell{ /*width:800px; margin-left:16% !important;*/ margin-right:auto; } h1 { font-family: Helvetica, serif; } h4{ margin-top:12px; margin-bottom: 3px; } div.text_cell_render{ font-family: Computer Modern, "Helvetica Neue", Arial, Helvetica, Geneva, sans-serif; line-height: 145%; font-size: 130%; /*width:800px;*/ margin-left:auto; margin-right:auto; } .CodeMirror{ font-family: "Source Code Pro", source-code-pro,Consolas, monospace; } .prompt{ display: None; } .text_cell_render .exercise { font-weight: 300; /*font-size: 22pt;*/ color: #4057A1; font-style: italic; /*margin-bottom: .5em; margin-top: 0.5em; display: block;*/ } .text_cell_render .example { font-weight: 300; color: #40A157; font-style: italic; } .warning{ color: rgb( 240, 20, 20 ) }