/build/static/layout/Breadcrumb_cap_w.png

Dragon Naturally Speaking with powershell

Hi Techies,
I am trying to install Dragon Naturally Speaking v12 in silent mode using ps application dep kit.
This is my line of script in PS.
Execute-Process -path "setup.exe" -parameters '/S /v"SERIALNUMBER=xxxxx-xxx-xxxx-xxxx-xxA SKIP_PENDINGREBOOT_CHECK=1 REBOOT=ReallySuppress ADDLOCAL=ALL NAS_ADDRESS=xxxxx DEFAULTSINI="%~dp0nsdefaults.ini" NAS_LDAP_SIGN_ON=1 QUICKSTART=0 /log %temp%\InstallDragon12.5.log /qn" '

correct me if I am wrong please. getting the below error. during installation when running from command prompt. 
From comand prompt  i am using "Deploy-Application.exe" -DeploymentType Install

CRVs9P.png

1 Comment   [ + ] Show comment
  • You might want to enlarge or advise what the errors are as they are illegible.... - Maidens 4 years ago

Answers (1)

Posted by: rileyz 4 years ago
Red Belt
0

You cant use %~dp0 with PowerShell btw, just take them out as the script should dump you in the source directory.

Execute-Process -path "setup.exe" -parameters '/S /v"SERIALNUMBER=xxxxx-xxx-xxxx-xxxx-xxA SKIP_PENDINGREBOOT_CHECK=1 REBOOT=ReallySuppress ADDLOCAL=ALL NAS_ADDRESS=xxxxx DEFAULTSINI="%~dp0nsdefaults.ini" NAS_LDAP_SIGN_ON=1 QUICKSTART=0 /log %temp%\InstallDragon12.5.log /qn" '

Comments:
  • Hi Rileyz,
    I have tried in different ways with and without %~dp0 . However, nsdefault.ini file is available in "Files" folder of PS App Dep kit. which holds all the installation and supporting files. - jaihanuman 4 years ago
    • More the source out of the"Files" folder and put them one level up. Should be able to find them when it executes. - rileyz 4 years ago
 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ