INSTALLING AND OPERATING CARRIER SOFTWARE ON NETWORKS



Similar documents
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Installation Instructions Release Version 15.0 January 30 th, 2011

Magaya Software Installation Guide

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

CANON FAX L360 SOFTWARE MANUAL

TeamPoS2000-M Windows XP Pro Device Installation

Remote Management System

Virtual Office Remote Installation Guide

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

LOS ANGELES UNIFIED SCHOOL DISTRICT Policy Bulletin

Installation Instruction STATISTICA Enterprise Small Business

Pearl Echo Installation Checklist

SOS Suite Installation Guide

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

Installation Instruction STATISTICA Enterprise Server

Initial Installation and Configuration

Client Program Installation Guide

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

Server Edition Administrator s Guide

Free GMATPrep Test-Preparation Software Download and Installation Instructions

CompleteView Alarm Client User s Manual. Version 3.8

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Software Installation Procedure (MS Windows)

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001)

Analyzer 2.0. Installation Guide. Contents

File Management Utility. T u t o r i a l

Shelter Pro Installation Guide. Overview. Database backups. Shelter Pro Installation Guide Page 1

Kurzweil 3000 for Windows Network Installation and Administration Guide Version 10

Updated: May Copyright DBA Software Inc. All rights reserved. 2 Getting Started Guide

Network Edition Download / Installation Instructions

Installation Guide Sybase ETL Small Business Edition 4.2 for Windows

Acronis Backup & Recovery 11

How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000)

GUARD1 PLUS SE Administrator's Manual

Hosted Service Tips and Troubleshooting

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

Snow Inventory. Installing and Evaluating

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

Color icontrol (Color iqc, Color imatch) Installation of Terminal Server Version 4.x, 5.x

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

WhatsUp Gold v16.1 Installation and Configuration Guide

Guide to Installing BBL Crystal MIND on Windows 7

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

XF Extracellular Flux Analyzer. Installation and Troubleshooting Guide

Installing FileMaker Pro 11 in Windows

Embarcadero Performance Center 2.7 Installation Guide

4 Backing Up and Restoring System Software

Installation Guide for Workstations

Human Resources Installation Guide

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

FILE TRANSFER PROTOCOL (FTP) SITE

StruxureWare Power Monitoring 7.0.1

CompleteView Alarm Client User Manual. CompleteView Version 4.3

Host Connectivity Kit PVCAM for PI Cameras Installation

17 April Remote Scan

WhatsUp Gold v16.2 Installation and Configuration Guide

How To Install Sedar On A Workstation

Installing the Microsoft Network Driver Interface

Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited

VERITAS Backup Exec TM 10.0 for Windows Servers

QUANTIFY INSTALLATION GUIDE

Chapter 5: Fundamental Operating Systems

Connecting Remotely via the Citrix Access Gateway (CAG)

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Allworx OfficeSafe Operations Guide Release 6.0

Contents. VPN Instructions. VPN Instructions... 1

Personal Folders Backup

Installation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks

Microsoft SQL 2008 / R2 Configuration Guide

UNICORN 6.4. Administration and Technical Manual

Fuji Synapse PACS Installation Instructions Radiology Specialists of Denver, P.C.

Topaz Installation Sheet

Use Remote Desktop capabilities to Access your Work PC from home over VPN

Installation Instructions for Version 8 (TS M1) of the SAS System for Microsoft Windows

ECLIPSE & Faircom ODBC Driver

ADMINISTRATOR S GUIDE

Updated: April Copyright DBA Software Inc. All rights reserved. 2 Getting Started Guide

Network Server for Windows. Overview of the Sequencher Network Page 2. Installing Sequencher Server for the First Time Page 3

1. System Requirements

Getting Started with Vision 6

Table of Contents. 2 Getting Started Guide

Copyright 2011 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC is a registered trademarks of DataNet Quality Systems.

7.x Upgrade Instructions Software Pursuits, Inc.

Aspera Connect User Guide

4cast Client Specification and Installation

Installation / Migration Guide for Windows 2000/2003 Servers

Networking Best Practices Guide. Version 6.5

Inmagic ODBC Driver 8.00 Installation and Upgrade Notes

3 Setting up Databases on a Microsoft SQL 7.0 Server

SYSTEM REQUIREMENTS...

Installing S500 Power Monitor Software and LabVIEW Run-time Engine

Automation License Manager

Transcription:

INSTALLING AND OPERATING CARRIER SOFTWARE ON NETWORKS COPYRIGHT 2002-2005 CARRIER CORPORATION

Installing and Operating Carrier Software on Networks Carrier Corporation Software Systems Network Manual Published... 5/2002 1st Revision... 12/2002 2nd Revision... 8/2003 3rd Revision... 2/2004 4th Revision... 5/2005 Copyright 2002-2005 Carrier Corporation

Table of Contents 1.0 Introduction...1 1.1 Quick Start...2 1.1.1 Software Capabilities...2 1.1.2 Installing the Software...2 1.1.3 Running the Software...3 1.1.4 Maintaining the Software...3 1.2 Overview of Network Concepts...3 1.2.1 Network Compatibility...3 1.2.2 Client/Server...3 1.2.3 Data Sharing...3 1.2.4 Program Sharing...4 1.2.5 Printer Sharing...4 1.3 Installing the Software on a Network...4 1.3.1 Installing the Software...4 1.3.2 Assigning Privileges to Network Users...5 1.4 Running the Software on a Network...6 1.5 Adding Users...6 1.6 Removing Users...6 1.7 Adding or Updating Programs...6 1.8 Uninstalling the Software from a Network...7 1.8.1 Uninstalling an Individual Program...7 1.8.2 Uninstalling all Carrier Software...7 i Installing and Operating Carrier Software on Networks

1.0 Introduction This document provides information about installing and operating Carrier software on networked computer systems. Network capabilities depend on the type of software involved. Currently there are three types of Carrier software in circulation: DOS-based, 16-bit Windows and 32-bit Windows. The software is steadily being converted to the 32-bit Windows format, but in the interim some programs are still in a DOS-based or 16- bit Windows format. Briefly: 32-bit Windows Software can be configured for network operation. The remainder of this manual explains how to install, operate and maintain the 32-bit software on a network system. 32-bit Windows software includes: Applied RTU Builder v1.0 and later. AHUBuilder v4.0 and later. Air Terminal Selection v3.0 and later. Chiller System Optimizer v2.0 and later Commercial Inve$t Rooftops v2.0 and later Commercial Split Systems v4.0 and later Engineering Economic Analysis v3.0 and later Fan Coil Builder v4.0 and later The discussion of networking 32-bit software begins with a summary: Hourly Analysis Program v4.0 and later. Packaged Chiller Builder v3.0 and later Packaged RTU Builder v1.0 and later Refrigerant Piping Design v4.0 and later VPACBuilder v1.0 and later. WSHP Builder v4.0 and later. 19XR Evergreen ChillerBuilder v3.0 and later Quick Start (Section 1.1) - A concise summary of how to install and configure the software for network operation. The remaining sections of the manual provide greater detail on each subject involving 32-bit Windows programs: Overview of Network Concepts (Section 1.2) Installing the Software on a Network (Section 1.3) Running the Software on a Network (Section 1.4 Adding Users (Section 1.5) Removing Users (Section 1.6) Adding or Updating Programs (Section 1.7) Uninstalling Software from the Network (Section 1.8) 16-bit Windows Software should not be configured for network operation. The software uses database files for data storage and these databases have not been configured for concurrent access. Therefore, there is a danger that multiple users working with the same database file at the same time on a network drive will corrupt or destroy information in the database file. Thus, our recommendation against networking this software. 16-bit software includes: Block Load v3.0 and later Separate Sale Coil Selection v1.0 and later Rooftop Packaged Units v6.0 and later Unit Ventilator Selection v1.0 and later Packaged Chiller Selection v2.0 and later rev May, 2005 Page 1

DOS-Based Software can be configured for network operation. Please refer to Chapter 9 of the E20-II Guide to Operations or Electronic Catalog Guide to Operations manuals for complete instructions. DOS software includes: Duct Design v3.x DuctLINK v2.x Engineering Economics v2.x HAP v3.x Water Piping Design v3.x 1.1 Quick Start This section provides a summary of the information found in the remainder of this manual. Use it to quickly install and configure the software for network operation. 1.1.1 Software Capabilities The Carrier software has the following capabilities in a network environment. For further details refer to section 1.2. The software is network aware. It is not client/server software. It permits sharing of data among users. It does not permit concurrent access to data. It permits sharing of programs among users. It permits sharing of printers among users. 1.1.2 Installing the Software The following procedure must be repeated for each workstation which is to have access to the software. For further information refer to section 1.3. 1. Verify that the workstation meets minimum requirements for the software: Random Access Memory (RAM): At least 32 megabytes. Display Monitor: VGA with 800x600 resolution or higher with at least 256 colors.. Operating System: Windows 98, Windows ME, Windows NT (service pack 4 or higher), Windows 2000 or Windows XP. A CD-ROM drive. 2. Log in as the network administrator. On Windows NT, 2000 and XP terminals, log in as the administrator for the workstation. Make sure all other programs are closed. 3. Follow the installation instructions on the release sheet provided with the software to begin the installation process. 4. Carrier Configuration Services is installed first. Specify the network server drive as the install drive. Supply the company name to appear on reports. (This is only required on first workstation and only if no Carrier 32-bit Windows program was previously installed). 5. The particular Electronic Catalog or E20-II program is installed next. 6. You may be asked to reboot the workstation to activate Windows system components that were installed. This completes the installation. 7. Assign Read, Write, Create and Destroy file privileges to the \E20-II folder on the server drive and all its subfolders. It is possible to be more selective about assigning file privileges if you wish. See 1.3.2 for details Page 2 rev May. 2005

1.1.3 Running the Software To run the software, refer to instructions in the program release sheet for starting the program. For further details, see section 1.4. 1.1.4 Maintaining the Software For information on: 1. Adding new users see section 1.5. 2. Removing existing users see section 1.6. 3. Adding or updating programs see section 1.7. 4. Uninstalling programs see section 1.8. 1.2 Overview of Network Concepts This section provides an overview of the capabilities of the Carrier 32-bit Windows software in a network environment. This information is often useful to network administrators planning for installation, operation and maintenance of the software. The network capabilities of the Carrier software can be summarized as follows: The software is network aware. The software is not client/server software. The software permits sharing of project data among network users, but does not permit concurrent access to data. The software permits sharing of programs among network users. The software permits sharing of printers among users. Each of these items is discussed in greater detail in the following sub-sections. 1.2.1 Network Compatibility Carrier 32-bit software is network aware meaning it can make use of networking features and thereby provide various networking benefits to its users. 1.2.2 Client/Server The Carrier software is not client/server software. Among the components used by the software, some are installed on the central server and others on the workstation. A single installation procedure run from the workstation automatically installs the required software on the central server and the workstation. 1.2.3 Data Sharing One of the important benefits of computer networking is the ability to share data among users of the network and even to permit the same data set to be accessed simultaneously by two or more users. In this respect, Carrier software permits data sharing among users, but does not permit concurrent access to the same data. Details are provided below: Data Sharing: Carrier software stores data in units referred to as projects. Briefly, a project is a container for data from one or more application programs. Carrier software automatically permits sharing of data among network users. By sharing we mean that users have access to the data and may work with it. Further details on this subject are provided in sections 1.3 and 1.4 Further information on projects and project data management can be found in the help system for each Electronic Catalog or E20-II program. Example #1: If project data is shared among all users, user JohnSmith can create and save project data. User KenJones can later open and work with any project created by JohnSmith or any other user. rev May, 2005 Page 3

Example #2: Users JohnSmith and KenJones are running Carrier software on a network. The network administrator wishes to keep data for these two users private so each may use his own project data, but may not use the other s project data. To achieve this, projects must be stored in folders with restricted file privileges. For example, only JohnSmith is granted read, write, create and destroy file rights to folders containing his projects, and only KenJones is granted read, write, create and destroy file rights to folders containing his projects. Concurrent Access: Some software programs permit two or more users to simultaneously work with the same data at the same time. Such programs are often referred to as multi-user database programs. While Carrier software permits data sharing, it does not permit concurrent access. Example: Users SarahJohnson and SusanWilliams are running Carrier software on a network. SarahJohnson and SusanWilliams can view and work with each other s projects so long as they do not attempt to work with data for the same application in the same project concurrently. For example, they cannot both work with HAP v4 data in the same project at the same time. However, if a project contains data for HAP v4, and an E-CAT application, one user could work with the HAP data and another user could work with the E-CAT program data in the same project at the same time. 1.2.4 Program Sharing Another benefit of computer networking is allowing users to share one set of program files. As a result, a program can be installed in one location on the network server computer and accessed by individual users on their workstations, rather than the program being installed on each individual workstation. This reduces hard disk usage across the network, and reduces the burden of maintenance and support for network administrators. Carrier software permits program sharing. Two or more users can concurrently run the software using a single copy of the program on the network server. 1.2.5 Printer Sharing A third benefit of networked systems is the ability of users to print to common printer devices attached to the network. Rather than having individual printers dedicated to each workstation, one or a smaller number of printers can be connected to the network for all users to utilize. Carrier software permits printer sharing automatically. 1.3 Installing the Software on a Network This section explains how to install Carrier 32-bit Windows software on a computer network. The procedures are straightforward and are similar to those for a standalone computer system. Steps in the installation process are described in the sections below: 1.3.1 Installing the Software The following installation procedure must be repeated for each workstation that will have access to the Carrier software on the network server. This is because the installation procedure not only installs software on the network server, but also installs supporting components that are required on each individual workstation. Installation also creates a group and several program items on the user s Start/Programs Menu. The installation procedure is as follows: 1. Make sure each workstation computer meets the minimum requirements: At least 32 megabytes of random access memory (RAM). A VGA display monitor with 800x600 resolution and 256 colors, or higher. One of the following operating systems: Windows 98, Windows NT (Service Pack 4 or higher), Windows 2000 or Windows XP. A CD-ROM drive. Page 4 rev May. 2005

2. Before beginning the software installation: Make sure you are logged into the network as the network administrator so you are guaranteed of having sufficient data privileges to install files on the network server. When installing on a computer using Windows NT, 2000 or XP, make sure you are logged in as the administrator on the workstation before installing the software. This is required so the installer can update Windows system software components such as DLLs. Make sure all other programs have been closed. The workstation may need to be rebooted at the end of the installation. While the reboot procedure will automatically close any running programs and will prompt you to save unsaved data, it is usually better if you save and close programs before starting the installation. 3. Follow the instructions listed in the program release sheet to install the software. At the end of the installation procedure you may be asked to reboot the workstation computer to activate Windows software components installed on the workstation. 1.3.2 Assigning Privileges to Network Users Installation of the software creates several file folders on your network server drive. describes the required privileges. This section Software installation creates an E20-II folder on the network server drive and a number of sub-folders beneath E20-II. Within these folders are files for which users will need read, write, create, and/or destroy file privileges. The simplest approach is to assign Read, Write, Create and Destroy privileges to the E20- II folder and all its sub-folders. However, if desired, privileges can be more selectively assigned as described below. E20-II E20-II\ENVIRO E20-II\ARCHIVES Read, Write, Create, Destroy privileges required. Write privilege is only required the first time a network user runs the software so the user can be registered in the E20XYCFG.MDB database file (only if the software was installed for Network - all data is private mode). The Create and Destroy privileges are only required for opening this database. Each time the database is opened, a companion locking (.LDB) file is created; each time the database is closed the.ldb file is erased. Read, Write, Create, Destroy privileges required. In this folder is a database file which contains information about the location of each user s projects. All four privileges are required to work with this database. Optional: If network users will store archives of project data in this folder, then Read, Write, Create and Destroy privileges will be needed. Otherwise, if archive files will be stored elsewhere, no privileges are needed. An archive is a compressed file containing all the individual files comprising a project. It is created to safeguard data or when transferring data to external computers. E20-II\PROJECTS Optional: If network users will store projects in folders beneath E20-II\PROJECTS, then Read, Write, Create and Destroy privileges will be needed. However, Carrier software permits users to store project data in any folder on any drive the user has access to. Therefore, if E20-II\PROJECTS will not be used for data storage, no privileges are necessary. E20-II\TEMP E20-II\app\CODE Read, Write, Create, Destroy privileges required because certain Carrier programs use this folder as a temporary repository for data. Read, Write, Create, Destroy. For each Electronic Catalog or E20-II program installed, one of these folders is created. For example Air Terminal Selection v3.0 creates an E20-II\ATS30\CODE folder; HAP creates an E20-II\HAP40\CODE folder. These folders contain program files for a particular program. While most of these files only require Read privileges, Write, Create, and Destroy privileges are required to work the database files in the folder. rev May, 2005 Page 5

E20-II\CSI10, E20-II\CSI20, E20-UU\CSI21 E20-II\E20DOS E20-II\INSTALL No privileges. These folders contains information used when uninstalling Configuration Services. Since uninstall is a procedure that should only be performed by the network administrator, no user privileges should be assigned to this folder. No privileges. This folder contains information used when uninstalling the DOS E20-II Configuration Program. Since uninstall should only be performed by a network administrator, no user privileges should be assigned to this folder. No privileges. This folder is used during install and uninstall activities. Since these tasks should only be performed by a network administrator, no user privileges should be assigned to this folder. 1.4 Running the Software on a Network To run and use the software: 1. From the Windows desktop, press the Start button and choose Programs. 2. From the Programs menu, choose the proper program group and item to launch the program. 3. Operation of the program begins. Because projects can be shared across a network, the Open Project dialog will list all projects created by all users. Any user can open and work with any project so long as the project data is stored in an area of the network to which the user has read, write, create and destroy file privileges. 1.5 Adding Users Periodically it may be necessary to give a new user from a new workstation access to the Carrier 32-bit Windows software. To add a user, install the software to the network server from the user s workstation as described in the section 1.3. This installs the necessary Windows system components on the workstation and also creates a Start/Programs Menu item to start the software. Also use principles discussed in section 1.3 to assign data privileges for the user to the E20-II folder and its sub-folders. 1.6 Removing Users From time to time it may be necessary to remove a user who was using the Carrier 32-bit Windows software. There are only two concerns here. One is removing Start/Program Menu items. The second, which is optional, is removing file privileges to the program files on the server First, on the user s workstation manually remove from the Start/Programs menu the Carrier ECAT/E20 Programs group and all of the program items this group. Second, if necessary, remove the user s file access privileges for the \E20-II folder on the network server. Note that you should not uninstall the software from the user s workstation. This will not only remove components from the local workstation, but it will also uninstall software from the network server. This will prevent all other network users from running the software. 1.7 Adding or Updating Programs As new Carrier 32-bit Windows programs are released or existing programs are updated, it will be necessary to install them on the network and provide network users with access to the programs. To accomplish this task, follow the instructions provided on a program s release sheet for installing the software. If Read, Write, Create, Destroy file privileges have not been granted to the E20-II folder on the server and all its sub-folders, then these privileges will need to be assigned to the CODE folder for the new application. Page 6 rev May. 2005

1.8 Uninstalling the Software from a Network This help topic describes the procedures used to uninstall Carrier 32-bit Windows software from a network. Uninstall may be required as program versions become obsolete, or when reconfiguring the software on a network. 1.8.1 Uninstalling an Individual Program To uninstall an individual program, please use the following procedure. 1. Choose one workstation and perform steps 2 through 6 on this workstation. 2. From the Windows Desktop, press the Start button, choose Settings and then choose Control Panel. 3. In the Control Panel, double-click on the Add/Remove Programs icon. 4. In the Add/Remove Programs dialog, select the program you wish to uninstall and then press the Add/Remove button. 5. When the Uninstall dialog appears, choose the automatic option. As the uninstall proceeds, additional dialogs may appear asking if it is OK to remove a specific file. Press the Yes button in each case. This will remove files for the program and its file integrity verification checker from the network server and will remove the Start/Programs Menu items on the workstation being used. 7. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the name of the program you uninstalled still appears on the list of programs, this is not cause for concern. Windows has not yet updated the list. 8. On the remaining workstations, the Start/Program Menu item must be removed manually. It is not necessary to remove the software components that were installed to the local workstation drive. 1.8.2 Uninstalling All Carrier Software To completely uninstall all Carrier Electronic Catalog and E20-II software, please use the following procedure. This procedure is typically used when reconfiguring the software. 1. Choose one workstation and perform steps 2 through 11 on this workstation. Removing Application Programs 2. From the Windows Desktop, press the Start button, choose Settings and then choose Control Panel. 3. In the Control Panel, double-click on the Add/Remove Programs icon. 4. In the Add/Remove Programs dialog, select the application program you wish to uninstall and then press the Add/Remove button. 5. When the Uninstall dialog appears, choose the automatic option. As the uninstall proceeds, additional dialogs may appear asking if it is OK to remove specific files. Press the Yes button. This will remove files for the chosen program and its file integrity verification checker from the network server and will remove the Start/Programs Menu items from the workstation being used. 6. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the name of the program you uninstalled still appears on the list of programs, this is not cause for concern. Windows has not yet updated the list. 7. Repeat steps 2-6 for each Carrier application that must be uninstalled. rev May, 2005 Page 7

Removing ECAT / E20 Configuration Services Program 8. In the Add/Remove dialog select the ECAT / E20 Configuration Services item and press the Add/Remove button. 9. When the Uninstall dialog appears, choose the automatic option. As the uninstall proceeds, additional dialogs may appear asking if it is OK to remove specific files. Press the Yes button. This will remove ECAT/E20-II Configuration Services software and its file integrity verification checker from the network server and will also remove the Start/Programs Menu items from the workstation being used. 10. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the name of the ECAT / E20 Configuration Services item still appears on the list of programs, this is not cause for concern. Windows has not yet updated the list. 11. Exit from the Add/Remove Dialog. Erasing Configuration Services Databases 12. Run Windows Explorer from any workstation. 13. Navigate to the \E20-II folder on the network server drive and erase the E20XYCFG.MDB file. This is a database file used by the Carrier software to coordinate software operation. It was not uninstalled automatically in the previous steps for safety reasons - if the software is uninstalled accidentally, network user information can be recovered as long as this file still exists. 14. Navigate to the \E20-II\ENVIRO folder on the network server drive and erase the PRJXY000.MDB file. This file contains the index of user projects. The file is not uninstalled automatically in the previous steps for safety reasons - if the software is uninstalled accidentally, network user information can be recovered as long as these files still exist. Removing Start Items on Other Workstations 15. On each additional workstation, manually remove the Start/Programs Menu group titled Carrier E-CAT and E20-II Programs and all its items and sub-groups. Page 8 rev May. 2005