Data corruption is the damage of information caused by various hardware or software failures. After a file gets damaged, it will no longer work correctly, so an application will not start or will give errors, a text file will be partially or fully unreadable, an archive will be impossible to open and then unpack, etc. Silent data corruption is the process of info getting damaged without any identification by the system or an administrator, which makes it a significant problem for website hosting servers as problems are much more likely to occur on bigger hard disk drives where large volumes of information are kept. In case a drive is a part of a RAID and the info on it is copied on other drives for redundancy, it is more than likely that the bad file will be treated as a regular one and it will be duplicated on all of the drives, making the harm permanent. Lots of the file systems that operate on web servers nowadays often are unable to recognize corrupted files immediately or they need time-consuming system checks during which the server is not operational.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data that you upload to your new cloud hosting account will be ensured by the ZFS file system that we make use of on our cloud platform. The majority of hosting suppliers, including our company, use multiple hard drives to keep content and considering that the drives work in a RAID, the exact same info is synchronized between the drives all the time. When a file on a drive becomes damaged for whatever reason, however, it's very likely that it will be reproduced on the other drives because alternative file systems do not include special checks for this. Unlike them, ZFS employs a digital fingerprint, or a checksum, for each and every file. In case a file gets corrupted, its checksum will not match what ZFS has as a record for it, which means that the bad copy will be replaced with a good one from another drive. Since this happens right away, there is no possibility for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

We've avoided any risk of files getting corrupted silently as the servers where your semi-dedicated hosting account will be created employ a powerful file system called ZFS. Its key advantage over other file systems is that it uses a unique checksum for each and every file - a digital fingerprint that's checked in real time. Since we keep all content on multiple NVMe drives, ZFS checks if the fingerprint of a file on one drive corresponds to the one on the remaining drives and the one it has saved. In the event that there is a mismatch, the corrupted copy is replaced with a good one from one of the other drives and because it happens instantly, there's no chance that a damaged copy could remain on our website hosting servers or that it could be copied to the other drives in the RAID. None of the other file systems work with such checks and furthermore, even during a file system check following an unexpected power failure, none of them will discover silently corrupted files. In contrast, ZFS will not crash after a blackout and the regular checksum monitoring makes a time-consuming file system check obsolete.