Reading Note for Probabilistic Programming and Bayesian Methods for Hackers, Chapter 1