Data corruption is the damage of info because of various software or hardware failures. When a file is corrupted, it will no longer function accurately, so an app will not start or shall give errors, a text file could be partially or completely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of data getting damaged without any identification by the system or an administrator, that makes it a serious problem for web hosting servers as failures are very likely to occur on larger in size hard disk drives where large volumes of info are stored. When a drive is a part of a RAID and the info on it is replicated on other drives for redundancy, it's likely that the bad file will be treated as an ordinary one and it will be duplicated on all of the drives, making the damage permanent. A lot of the file systems which operate on web servers these days often are not able to identify corrupted files in real time or they need time-consuming system checks through which the server is not working.

No Data Corruption & Data Integrity in Shared Web Hosting

The integrity of the data that you upload to your new shared web hosting account shall be guaranteed by the ZFS file system that we make use of on our cloud platform. Most of the web hosting providers, including our company, use multiple hard disks to keep content and since the drives work in a RAID, identical info is synchronized between the drives all the time. In case a file on a drive becomes damaged for whatever reason, however, it is likely that it will be reproduced on the other drives because alternative file systems don't have special checks for that. In contrast to them, ZFS works with a digital fingerprint, or a checksum, for every file. In the event that a file gets damaged, its checksum won't match what ZFS has as a record for it, and the damaged copy will be substituted with a good one from a different drive. Because this happens immediately, there is no risk for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Servers

We've avoided any chance of files getting damaged silently as the servers where your semi-dedicated server account will be created use a powerful file system known as ZFS. Its advantage over other file systems is that it uses a unique checksum for each and every file - a digital fingerprint that's checked in real time. As we save all content on multiple SSD drives, ZFS checks whether the fingerprint of a file on one drive matches the one on the rest of the drives and the one it has stored. In case there's a mismatch, the bad copy is replaced with a healthy one from one of the other drives and considering that this happens in real time, there's no chance that a corrupted copy can remain on our website hosting servers or that it can be copied to the other hard drives in the RAID. None of the other file systems employ this type of checks and what's more, even during a file system check following an unexpected blackout, none of them will detect silently corrupted files. In contrast, ZFS will not crash after an electrical power failure and the constant checksum monitoring makes a lenghty file system check obsolete.