Top 3 New Features in Pandas 1.0

栏目: IT技术 · 发布时间: 5年前

Top 3 New Features in Pandas 1.0

A couple of new time and nerve saving features

It’s been a couple of weeks now since Pandas version 1.0 was released and it’s brought some new exciting features, some of them still being experimental though.

Top 3 New Features in Pandas 1.0

The main idea behind this article is to briefly explore them, and also show you how to upgrade to Pandas 1.0 because you’re probably still running version 0.25. So without much ado, let’s see how to do so.

Upgrade from 0.25 to 1.0

If I were to open up Jupyter Notebook and check out the current version of Pandas library, I’d get this:

Top 3 New Features in Pandas 1.0

I’m on version 0.25.1, so to upgrade I’d need to execute the following command (can also be done through Jupyter, no need to open up a terminal or command prompt):

If you, however, get some permission errors , run the command line as an administrator, or prefix the command with sudo if you’re on Linux. Now let’s see if everything went as expected:

Top 3 New Features in Pandas 1.0

Keep in mind that you might not see ‘1.0.1’, depending on when you’re reading the article, it might be an even newer version. Now when that’s done, let’s briefly discuss the dataset I’ll use to make demonstrations, and also where to get it.

Dataset used

I’ve decided to use the MT Cars dataset , a dataset familiar to any R user, great for some basic data manipulation. It can be download from this link , or you can just copy the link and read it directly through Pandas:

Top 3 New Features in Pandas 1.0

Okay, now when that’s out of the way, I can begin with the article!


以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

Web应用漏洞侦测与防御

Web应用漏洞侦测与防御

Mike Shema / 齐宁、庞建民、张铮、单征 / 机械工业出版社 / 2014-8-20 / 69.00

本书由国际知名网络安全专家亲笔撰写,全面讲解如何预防常见的网络攻击,包括HTML注入及跨站脚本攻击、跨站请求伪造攻击、SQL注入攻击及数据存储操纵、攻破身份认证模式、利用设计缺陷、利用平台弱点、攻击浏览器和隐私等, 全书共8章:第1章介绍HTML5的新增特性及使用和滥用HTML5的安全考虑;第2章展示了如何只通过浏览器和最基本的HTML知识就可以利用Web中最常见的漏洞;第3章详细讲解CSR......一起来看看 《Web应用漏洞侦测与防御》 这本书的介绍吧!

图片转BASE64编码
图片转BASE64编码

在线图片转Base64编码工具

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换