Data corruption is the damage of information because of various software or hardware fails. When a file is corrupted, it will no longer function as it should, so an app will not start or will give errors, a text file shall be partially or entirely unreadable, an archive will be impossible to open and then unpack, etc. Silent data corruption is the process of data getting harmed without any identification by the system or an administrator, that makes it a significant problem for hosting servers as failures are much more likely to occur on larger hard disk drives where considerable volumes of information are placed. In case a drive is part of a RAID and the info on it is copied on other drives for redundancy, it is more than likely that the damaged file will be treated as an undamaged one and it'll be copied on all the drives, making the damage permanent. A huge number of the file systems which operate on web servers today often are unable to discover corrupted files instantly or they need time-consuming system checks during which the server is not operational.

No Data Corruption & Data Integrity in Cloud Web Hosting

The integrity of the data which you upload to your new cloud web hosting account will be ensured by the ZFS file system that we use on our cloud platform. Most of the hosting service providers, including our firm, use multiple hard disks to store content and because the drives work in a RAID, exactly the same info is synchronized between the drives at all times. When a file on a drive is damaged for some reason, yet, it is likely that it will be reproduced on the other drives as alternative file systems do not include special checks for that. In contrast to them, ZFS applies a digital fingerprint, or a checksum, for each file. In case a file gets corrupted, its checksum will not match what ZFS has as a record for it, which means that the damaged copy shall be replaced with a good one from a different hard drive. Due to the fact that this happens in real time, there's no risk for any of your files to ever be corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

We have avoided any chance of files getting damaged silently because the servers where your semi-dedicated hosting account will be created employ a powerful file system called ZFS. Its key advantage over various other file systems is that it uses a unique checksum for every single file - a digital fingerprint which is checked in real time. As we save all content on a number of SSD drives, ZFS checks whether the fingerprint of a file on one drive matches the one on the other drives and the one it has stored. If there is a mismatch, the bad copy is replaced with a healthy one from one of the other drives and since it happens right away, there is no chance that a damaged copy can remain on our hosting servers or that it could be copied to the other drives in the RAID. None of the other file systems employ this type of checks and what is more, even during a file system check after an unexpected electrical power failure, none of them will detect silently corrupted files. In contrast, ZFS does not crash after an electrical power failure and the continual checksum monitoring makes a time-consuming file system check obsolete.