Data corruption is the damage of info caused by various software or hardware problems. The moment a file is damaged, it will no longer work as it should, so an application will not start or shall give errors, a text file will be partially or fully unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of data getting harmed without any identification by the system or an administrator, which makes it a significant problem for hosting servers as problems are more likely to occur on bigger hard disks where significant volumes of information are placed. If a drive is a part of a RAID and the info on it is replicated on other drives for redundancy, it is likely that the bad file will be treated as a good one and it'll be duplicated on all the drives, making the harm permanent. A huge number of the file systems which run on web servers these days often cannot identify corrupted files in real time or they need time-consuming system checks through which the server is not functioning.

No Data Corruption & Data Integrity in Cloud Website Hosting

The integrity of the data that you upload to your new cloud website hosting account shall be ensured by the ZFS file system that we use on our cloud platform. Most web hosting service providers, including our company, use multiple hard disks to store content and since the drives work in a RAID, exactly the same information is synchronized between the drives all the time. When a file on a drive becomes corrupted for some reason, however, it is more than likely that it will be duplicated on the other drives because alternative file systems don't offer special checks for that. In contrast to them, ZFS uses a digital fingerprint, or a checksum, for every single file. If a file gets damaged, its checksum will not match what ZFS has as a record for it, and the damaged copy will be replaced with a good one from a different drive. Because this happens instantly, there is no risk for any of your files to ever get corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Servers

If you purchase one of our semi-dedicated server plans, you will not need to be concerned about silent file corruption as we use ZFS - a high level file system which checks all of the files in real time. Every time you upload a file to your web hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. The file will be synced between multiple NVMe drives for redundancy, so if a drive fails, the other ones will take control. ZFS compares the checksum of all copies on the different drives and when it detects a corrupted copy, it replaces it with a healthy one from a different drive. This is done right away, so there will be no threat for any part of your content at any time. In comparison, all of the other file systems perform checks after a system failure, but since they do not use anything similar to the checksums that ZFS uses, they cannot detect silently corrupted files, so a corrupted copy could be replicated on the rest of the drives as well and you could lose critical info. As this is not the case with ZFS, we are able to warrant the integrity of each and every file you upload no matter what.