Solved

left function

Posted on 2011-03-17
6
166 Views
Last Modified: 2012-05-11
Hi,

Attached i have a ss

Go to sheet "Cash Nostro"

You can see where my formula lets me down, ive highlighted in red.

It is due to the length of the user name

I need a solution for this but im not 100% sure what to do and am looking for suggestions

Thanks
Seamus
Call-Latest-File.xls
0
Comment
Question by:Seamus2626
6 Comments
 
LVL 85

Accepted Solution

by:
Rory Archibald earned 300 total points
Comment Utility
I'd suggest you sort out however you parse the data into columns in the first place. :)
0
 
LVL 12

Assisted Solution

by:telyni19
telyni19 earned 200 total points
Comment Utility
It looks like you're pulling the first eight characters, whatever they are, into the first column. You probably need to split it out up to the first space instead. I looked through the code a bit and didn't see where you were getting the data though.
0
 
LVL 8

Expert Comment

by:wchh
Comment Utility
Try Formula below:
=IF(D27="No",IF(ISERROR(DAY(C27)),IF(ISERROR(SEARCH("t ",C27)),DATEVALUE(CONCATENATE(RIGHT(B27,LEN(B27)-SEARCH("t ",B27)-4),C27)),DATEVALUE(MID(C27,SEARCH("t ",C27)+2,LEN(C27)-SEARCH("t ",C27)))),C27),"")
0
How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

 
LVL 8

Expert Comment

by:wchh
Comment Utility
Make sure that your computer date format is 'dd/mm/yyyy'
0
 
LVL 8

Expert Comment

by:wchh
Comment Utility
Try Formula below fot time column:
=IF(D27="No",IF(ISERROR(DAY(C27)),IF(ISERROR(SEARCH("t ",C27)),TIMEVALUE(CONCATENATE(RIGHT(B27,LEN(B27)-SEARCH("t ",B27)-4),C27)),TIMEVALUE(MID(C27,SEARCH("t ",C27)+2,LEN(C27)-SEARCH("t ",C27)))),C27),"")
0
 

Author Closing Comment

by:Seamus2626
Comment Utility
The formulas didnt work guys

Thanks
Seamus
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

How to quickly and accurately populate Word documents with Excel data, charts and images (including Automated Bookmark generation) David Miller (dlmille) Synopsis In this article you’ll learn how to use ExcelToWord! to copy data,charts, shapes …
This tutorial explains how to create a series of drop-down lists that are dependent upon prior selections to guide (“force”) the user to make the correct selection and reduce data errors within Microsoft Excel. Excel 2010 was used for this tutorial;…
The viewer will learn how to simulate a series of sales calls dependent on a single skill level and learn how to simulate a series of sales calls dependent on two skill levels. Simulating Independent Sales Calls: Enter .75 into cell C2 – “skill leve…
Graphs within dashboards are meant to be dynamic, representing data from a period of time that will change each time the dashboard is updated with new data. Rather than update each graph to point to a different set within a static set of data, t…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now