Data corruption is the damage of info because of various hardware or software problems. After a file gets damaged, it will no longer work correctly, so an app will not start or will give errors, a text file shall be partially or entirely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of data getting harmed without any acknowledgement by the system or an administrator, which makes it a serious problem for web hosting servers as failures are more likely to happen on larger in size hard disk drives where considerable volumes of information are kept. In case a drive is part of a RAID and the data on it is copied on other drives for redundancy, it's very likely that the damaged file will be treated as an undamaged one and it will be duplicated on all drives, making the damage permanent. A lot of the file systems which run on web servers nowadays often are not able to discover corrupted files right away or they need time-consuming system checks through which the server isn't functioning.

No Data Corruption & Data Integrity in Web Hosting

The integrity of the data that you upload to your new web hosting account shall be guaranteed by the ZFS file system that we use on our cloud platform. The vast majority of internet hosting suppliers, like our firm, use multiple hard disks to store content and because the drives work in a RAID, identical information is synchronized between the drives all of the time. When a file on a drive becomes damaged for whatever reason, however, it's very likely that it will be reproduced on the other drives since alternative file systems don't include special checks for that. Unlike them, ZFS uses a digital fingerprint, or a checksum, for every single file. If a file gets corrupted, its checksum will not match what ZFS has as a record for it, so the bad copy will be swapped with a good one from another disk drive. Because this happens right away, there is no risk for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Servers

We have avoided any risk of files getting corrupted silently due to the fact that the servers where your semi-dedicated server account will be created take advantage of a powerful file system named ZFS. Its main advantage over alternative file systems is that it uses a unique checksum for each file - a digital fingerprint that is checked in real time. As we save all content on numerous SSD drives, ZFS checks whether the fingerprint of a file on one drive matches the one on the other drives and the one it has stored. When there is a mismatch, the bad copy is replaced with a good one from one of the other drives and since this happens instantly, there's no chance that a damaged copy can remain on our website hosting servers or that it can be duplicated to the other hard disks in the RAID. None of the other file systems use this kind of checks and what's more, even during a file system check right after an unexpected electrical power failure, none of them can identify silently corrupted files. In comparison, ZFS won't crash after a blackout and the constant checksum monitoring makes a time-consuming file system check unneeded.