.div.title a{pointer-events:none}.category-locales-data-centers-and-campus-rc-uab .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-uab #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/a9d7d4f215f2013907002ffe13456d3f90a7f108.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-unh .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-unh #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/7c78238f8472c1182685ab65f096464ade7280ac.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-quantum-computing .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-quantum-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/b16bb87c6ed75239da6ff40d602ee0c7d590741c.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-uri .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-uri #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/5aac831929efcaec1b4e40f4809e7e34a6f24496.jpeg") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-communities-rmacc .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-communities-rmacc #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/47a388e6bd9f4ba941b8724e2494a64a098a544c.jpg") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-mizzou .d-header{color:#fff !important;background-color:#000 !important;background-image:none !important;background:#000 !important}.category-locales-data-centers-and-campus-rc-mizzou #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/373c1391996a1058d10dce945c1374e73ae8089b.png") !important;display:inline-block;height:70px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-nc-state .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-nc-state #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/9f3255f012325904eb40c768f49c189b20d954bf.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-uvm .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-uvm #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/316e4e5bbbb37ce12f5ee65491c6c4ae6df1597e.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-cyberteams-kentucky-cyberteam .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-cyberteams-kentucky-cyberteam #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/277e0d45807090ed3c5bac146ac8b8371fc184d4.png") !important;display:inline-block;width:150px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-nect .d-header{color:#fff !important;background-color:#101624 !important;background-image:none !important;background:#101624 !important}.category-locales-data-centers-and-campus-rc-nect #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/daadd01d43b3fec2be4913bc30de846f572557db.png") !important;display:inline-block;width:105px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-mghpcc .d-header{color:#fff !important;background-color:#000 !important;background-image:none !important;background:#000 !important}.category-locales-data-centers-and-campus-rc-mghpcc #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/0c85715a989c8fa8b7c3e1209ead651cb0041fec.png") !important;display:inline-block;width:105px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-mit .d-header{color:#fff !important;background-color:#000 !important;background-image:none !important;background:#000 !important}.category-locales-data-centers-and-campus-rc-mit #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/682c56d56c0cf4780d6e171f95e9f616f44aef34.png") !important;display:inline-block;width:90px;font-size:0;margin-top:5px;margin-bottom:0px}.category-cyberteams-trecis .d-header{color:#000 !important;background-color:#000 !important;background-image:none !important;background:#020333 !important}.category-cyberteams-trecis #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/289411b3c15dbdbf7e0d621106be18c3c188d109.png") !important;display:inline-block;width:180px;font-size:0;margin-top:10px;margin-bottom:5px}.category-discussion-about-this-site-questions-about-how-site-works-ideas-for-enhancingimproving-friday-factoid .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-discussion-about-this-site-questions-about-how-site-works-ideas-for-enhancingimproving-friday-factoid #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/128ed0d3304e0c629e57d4be17b97248baadcf8a.png") !important;display:inline-block;width:180px;font-size:0;margin-top:5px;margin-bottom:0px}.category-jobs .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-jobs #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/80558647c0a2f39629c84d20e67976b82fe5cd46.png") !important;display:inline-block;width:120px;font-size:0;margin-top:5px;margin-bottom:0px}.category-discussion-about-this-site-questions-about-how-site-works-ideas-for-enhancingimproving-sunday-science .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-discussion-about-this-site-questions-about-how-site-works-ideas-for-enhancingimproving-sunday-science #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/ad6fc2fb9e6828d49d697e6b473131c02def00ad.png") !important;display:inline-block;width:180px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-northeastern .d-header{color:#fff !important;background-color:#2a5c89 !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-northeastern #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/01384bd700cda8602dee7e7d5d774f1a996682c6.png") !important;display:inline-block;width:150px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-yale .d-header{color:#fff !important;background-color:#2a5c89 !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-yale #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/2675be1e0c4110e260acf3d09f84e617a9c25182.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/2675be1e0c4110e260acf3d09f84e617a9c25182.png") no-repeat !important;display:inline-block;width:340px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-tufts .d-header{color:#000 !important;background-color:#2a5c89 !important;background-image:none !important;background:#2a5c89 !important}.category-locales-data-centers-and-campus-rc-tufts #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/7a1e7c988c62a0524ddb42a51f9e4c786e0c7594.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/7a1e7c988c62a0524ddb42a51f9e4c786e0c7594.png") no-repeat !important;display:inline-block;width:100px;font-size:0;margin-top:5px;margin-bottom:0px}.category-security-rsoc .d-header{color:#000 !important;background-color:#000 !important;background-image:none !important;background:#000 !important}.category-security-rsoc #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/d5d8fd819152ce1c6f2a69fd4f4b9e5a04c5c56d.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/d5d8fd819152ce1c6f2a69fd4f4b9e5a04c5c56d.png") no-repeat !important;display:inline-block;width:200px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-brown-research-computing .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-brown-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/a5debc6215bb772fc2cc4ece0d254d653e08812d.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/a5debc6215bb772fc2cc4ece0d254d653e08812d.png") no-repeat !important;display:inline-block;width:80px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-princeton-research-computing .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-princeton-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/bd0e69f66c453d83756d4c6d48b4a2417fd5b8b0.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/a5debc6215bb772fc2cc4ece0d254d653e08812d.png") no-repeat !important;display:inline-block;width:350px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-stanford-research-computing .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-stanford-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/70525e0736735302dec325d09b34a3a0b2933c24.jpeg") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/70525e0736735302dec325d09b34a3a0b2933c24.jpeg") no-repeat !important;display:inline-block;width:80px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-harvard-fas-research-computing .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-harvard-fas-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/b9a04983f9e2738777dd97eb03356628b755e000.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/b9a04983f9e2738777dd97eb03356628b755e000.png") no-repeat !important;display:inline-block;width:200px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-mines-research-computing .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-mines-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/162f7a4db8856c88c16f1bd36028578fc15cd9bc.png") !important;background:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/162f7a4db8856c88c16f1bd36028578fc15cd9bc.png") no-repeat !important;display:inline-block;width:300px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-ohio-supercomputing .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-ohio-supercomputing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/ee509dc0b56f667f342b2046703c5f4ee0bf3efd.png") !important;display:inline-block;width:300px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-umaine-system .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-umaine-system #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/c81a783995127d0946126fb2ef0dc59e8e0c5423.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-u-cincinnati-arc .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-u-cincinnati-arc #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/2X/a/ad1a07a90171242528496ace82939bef5de5e024.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-northern-arizona-university .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-northern-arizona-university #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/dece11ae230925e49e095405ec90bf5f49647bd6.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-uic .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-uic #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/9ed07d2cb57083ffe87d8eaf8adff6849a730c27.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-csu-research-computing .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-csu-research-computing #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/5fb6137db6c28dd86d6fd12487b831c66c5a3869.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-locales-data-centers-and-campus-rc-unh .d-header{color:#fff !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-locales-data-centers-and-campus-rc-unh #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/7c78238f8472c1182685ab65f096464ade7280ac.png") !important;display:inline-block;height:50px;font-size:0;margin-top:5px;margin-bottom:0px}.category-communities-computing-against-covid19 .d-header{color:#000 !important;background-color:#fff !important;background-image:none !important;background:#fff !important}.category-communities-computing-against-covid19 #site-text-logo{content:url("https://ask.cyberinfrastructure.org/uploads/default/original/1X/41eff1b5f7002062d7ec71d30332754f058935b9.png") !important;display:inline-block;width:250px;font-size:0;margin-top:5px;margin-bottom:0px}
/*# sourceMappingURL=common_theme_8_3662f8aca431ec772c79283a0559b75a74bbbc44.css.map?__ws=ask.cyberinfrastructure.org */
