Data corruption is the damage of info caused by various hardware or software problems. After a file is corrupted, it will no longer work correctly, so an application will not start or shall give errors, a text file will be partially or entirely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of info getting harmed without any identification by the system or an administrator, that makes it a significant problem for web hosting servers as fails are much more likely to happen on larger hard disk drives where substantial volumes of info are stored. If a drive is a part of a RAID and the info on it is replicated on other drives for redundancy, it is very likely that the damaged file will be treated as a good one and it'll be copied on all the drives, making the harm permanent. Lots of the file systems which operate on web servers these days often are unable to detect corrupted files instantly or they need time-consuming system checks during which the server is not working.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data that you upload to your new cloud hosting account shall be ensured by the ZFS file system which we work with on our cloud platform. The majority of internet hosting suppliers, including our company, use multiple hard disk drives to keep content and since the drives work in a RAID, identical info is synchronized between the drives all of the time. If a file on a drive is damaged for reasons unknown, yet, it is very likely that it will be duplicated on the other drives since other file systems do not include special checks for this. Unlike them, ZFS works with a digital fingerprint, or a checksum, for each file. In the event that a file gets damaged, its checksum will not match what ZFS has as a record for it, so the bad copy will be substituted with a good one from a different hard drive. As this happens in real time, there is no possibility for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you acquire one of our semi-dedicated hosting plans, you will not have to be concerned about silent file corruption as we use ZFS - a high level file system which checks all files in real time. Every time you upload a file to your website hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between several SSD drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all copies on the different drives and when it detects a damaged copy, it replaces it with a healthy one from a different drive. This is done immediately, so there will be no risk for any part of your content at any time. In comparison, all of the other file systems carry out checks only after a system breakdown, but since they do not use anything similar to the checksums that ZFS uses, they can't detect silently corrupted files, so a bad copy could be replicated on the other drives as well and you may lose critical info. As this isn't the case with ZFS, we warrant the integrity of each file you upload no matter what.