{"id":2973,"date":"2014-12-09T11:37:39","date_gmt":"2014-12-09T11:37:39","guid":{"rendered":"http:\/\/blogs.nist.ac.th\/eleict\/?p=2973"},"modified":"2018-10-05T11:25:51","modified_gmt":"2018-10-05T11:25:51","slug":"google-image-search-tools","status":"publish","type":"ht_kb","link":"https:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/google-image-search-tools\/","title":{"rendered":"Google Image Search Tools"},"content":{"rendered":"<p>Another &#8216;free&#8217; image solution? While nothing is perfect, Google has upped their game regarding theoretically &#8216;safe&#8217; ways to find and use images.<\/p>\n<p>Under Search\u00a0Tools, you&#8217;ll find the option for &#8216;Usage Rights&#8217;. That drop-down will give you a few more options to use. The reason I say &#8216;theoretically&#8217; is that it would still be technically possible for someone to take an image that isn&#8217;t theirs, upload it somewhere, and file it under &#8216;public domain&#8217;. However, the major benefit of this is that Google offers access to a far larger pool of images than the other solutions we&#8217;ve been looking at. Plus, it&#8217;s just as easy to do it on an iPad as on a laptop.<\/p>\n<p><a href=\"http:\/\/blogs.nist.ac.th\/eleict\/files\/2014\/12\/Screen-Shot-2014-12-09-at-10.15.13-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2975\" src=\"\/eleict\/files\/2014\/12\/Screen-Shot-2014-12-09-at-10.15.13-AM-300x225.png\" alt=\"Screen Shot 2014-12-09 at 10.15.13 AM\" width=\"701\" height=\"529\" \/><\/a>Of course, the images would still need to be attributed to their original source (for our purposes, the URL is still fine).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another &#8216;free&#8217; image solution? While nothing is perfect, Google has upped their game regarding theoretically &#8216;safe&#8217; ways to find and use images. Under Search\u00a0Tools, you&#8217;ll find the option for &#8216;Usage Rights&#8217;. That drop-down will give you a few more options to use. The reason I say &#8216;theoretically&#8217; is that it&#8230;<\/p>\n","protected":false},"author":2947,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[1122992,1123087,1123091],"ht-kb-tag":[1123066,904,326,463,889],"class_list":["post-2973","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-google-items","ht_kb_category-google-photos","ht_kb_category-google-searching","ht_kb_tag-find","ht_kb_tag-google","ht_kb_tag-images","ht_kb_tag-photos","ht_kb_tag-search"],"_links":{"self":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/2973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/users\/2947"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/comments?post=2973"}],"version-history":[{"count":1,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/2973\/revisions"}],"predecessor-version":[{"id":15378,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/2973\/revisions\/15378"}],"wp:attachment":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/media?parent=2973"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-category?post=2973"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-tag?post=2973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}