Data corruption is the damage of information due to various hardware or software problems. After a file is damaged, it will no longer work correctly, so an application will not start or shall give errors, a text file can be partially or fully unreadable, an archive file will be impossible to open and unpack, etc. Silent data corruption is the process of data getting harmed without any identification by the system or an administrator, which makes it a serious problem for hosting servers as failures are more likely to happen on larger in size hard disk drives where substantial volumes of info are located. When a drive is part of a RAID and the info on it is duplicated on other drives for redundancy, it is more than likely that the bad file will be treated as a healthy one and it'll be copied on all the drives, making the damage permanent. Lots of the file systems which run on web servers nowadays often cannot identify corrupted files right away or they need time-consuming system checks through which the server isn't functioning.

No Data Corruption & Data Integrity in Web Hosting

The integrity of the data which you upload to your new web hosting account will be ensured by the ZFS file system that we use on our cloud platform. The majority of hosting suppliers, including our firm, use multiple hard disk drives to store content and because the drives work in a RAID, identical info is synchronized between the drives at all times. If a file on a drive becomes damaged for some reason, yet, it's more than likely that it will be copied on the other drives since alternative file systems do not include special checks for that. Unlike them, ZFS employs a digital fingerprint, or a checksum, for each file. In case a file gets corrupted, its checksum won't match what ZFS has as a record for it, so the bad copy shall be swapped with a good one from another drive. As this happens right away, there is no risk for any of your files to ever get corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Servers

In case you purchase one of our semi-dedicated server solutions, you will not have to be concerned about silent file corruption because we use ZFS - a high level file system that checks all the files in real time. Every time you upload a file to your account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. This file will be synchronized between multiple SSD drives for redundancy, so if a drive fails, the other ones will take over. ZFS compares the checksum of all of the copies on the different drives and when it detects a damaged copy, it replaces it with a healthy one from another drive. This happens in real time, so there will be no danger for any part of your content at any moment. By comparison, other file systems carry out checks only after a system breakdown, but since they do not use anything similar to the checksums which ZFS uses, they will not detect silently corrupted files, so a corrupted copy can be replicated on the rest of the disks as well and you can lose precious data. Since this is not the case with ZFS, we are able to guarantee the integrity of each and every file you upload no matter what.