Solved

Invoice Aging

Posted on 2011-02-22
6
790 Views
Last Modified: 2012-05-11
Dear Experts,
I have three columns in excel sheet1 namely:
1.      Party name
2.      Invoice Date
3.      Invoice amount
We need to get aging of invoices in sheet2 after grouping party name with the following columns.
1.      Party name
2.      1-30 days
3.      31-60 days
4.      61-90 days
5.      91-120 days
6.      Over 120 days
7.      Total
Can someone help me to do such task?
Rgds.
Mehram
0
Comment
Question by:Mehram
  • 3
  • 3
6 Comments
 
LVL 81

Expert Comment

by:zorvek (Kevin Jones)
ID: 34958628
A formula like this will work:

=SUMPRODUCT((Sheet1!$A$2:$A$1000=$A2)*((TODAY()-Sheet1!$B$2:$B$1000)>(COLUMN()-2)*30)*((TODAY()-Sheet1!$B$2:$B$1000)<(COLUMN()-1)*30+1)*Sheet1!$C$2:$C$1000)

See the example.

Kevin
Q-26841131.xls
0
 

Author Comment

by:Mehram
ID: 34958673
This is one of great stuff, only need to get it little bit dynamic. Sheet1 information will copy past by the user always and sheet2 will dynamically update according to inform/agent name. Can we get party name by populate itself after grouping in sheet2?
0
 
LVL 81

Expert Comment

by:zorvek (Kevin Jones)
ID: 34958689
Will a macro be acceptable?

Kevin
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:Mehram
ID: 34958732
Can I see example file?
0
 
LVL 81

Accepted Solution

by:
zorvek (Kevin Jones) earned 500 total points
ID: 34958738
A macro solution is attached.

Kevin
Q-26841131.xls
0
 

Author Comment

by:Mehram
ID: 34958774
Great one.. Cheers
Post if any other solution is available for future reference/enhancement.
Rgds.
Mehram
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article I will describe the Copy Database Wizard method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
This code takes an Excel list of URL’s and adds a header titled “URL List”. It then searches through all URL’s in column “A”, looking for duplicates. When a duplicate is found, it is moved to the top of the list. The duplicate URL’s are then highlig…
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question