Mahara(open source eportfolios)
Mahara is a fully featured web application to build your electronic portfolio.You can create journals,upload files,embed social media resources from the web and collaborate with other users in groups.
- ePortfolio owners can receive public or private feedback on their pages.
- Users accessing a page can report any objectionable material directly to the site administrator.
- Users can add pages and artefacts within a page to their watchlist and receive automated notifications of any changes or updates.
- ePortfolio owners can submit a page for assessment by a tutor or teacher allowing for a snapshot of the page and associated artefacts on a certain date.
Within Mahara you can share details through a variety of optional profile information fields including:
- Preferred name
- Student ID
- Contact address and numbers
- Links to social media profile
- Profile pictures
- Create folder and sub folder structures
- Upload multiple files quickly and efficiently
- Give each file a name and description
- Manage your file allocation quota
- Extract .zip, .tar.gz and .tar.bz2 from within the files area
Journals and blogs:
The blogging tool allows you to:
- Create journal entries using a WYSIWYG editor
- Attach files to journal entries
- Embed images into entries
- Configure whether or not you want comments on your journal entries
- Create draft entries for later publishing
Other features :
- Resume builder:
Mahara includes a résumé builder which allows you to create digital CVs by entering information into a variety of optional fields
- Administration :
Administrators are able to customise Mahara via a number of configuration settings like Language packages and themes,Virus protocol,Session and account lifetimes,Authentication methods
- Mahara automatically detects system settings that a pose a security threat.
- Session key handling code has been tightly integrated with the core form/request APIs.
- Provides database abstraction that prevents any database injection attacks and input validation that prevents script injection attacks.
- User authentication can be tied to external systems such as student management systems or other databases such as their Student ID number.