Data corruption is the damage of data caused by various software or hardware failures. When a file is corrupted, it will no longer function properly, so an application will not start or will give errors, a text file shall be partially or entirely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of information getting harmed without any identification by the system or an admin, that makes it a serious problem for hosting servers as problems are much more likely to occur on bigger hard disk drives where vast volumes of information are kept. When a drive is part of a RAID and the information on it is copied on other drives for redundancy, it's more than likely that the bad file will be treated as a standard one and it will be copied on all the drives, making the damage permanent. A huge number of the file systems that run on web servers these days often cannot find corrupted files instantly or they need time-consuming system checks during which the server is not operational.

No Data Corruption & Data Integrity in Cloud Website Hosting

The integrity of the data that you upload to your new cloud website hosting account shall be ensured by the ZFS file system that we employ on our cloud platform. Most internet hosting suppliers, like our company, use multiple hard drives to store content and because the drives work in a RAID, exactly the same information is synchronized between the drives all of the time. In case a file on a drive gets corrupted for reasons unknown, yet, it is very likely that it will be reproduced on the other drives since alternative file systems don't feature special checks for that. Unlike them, ZFS uses a digital fingerprint, or a checksum, for each file. In the event that a file gets damaged, its checksum will not match what ZFS has as a record for it, so the bad copy will be swapped with a good one from another hard disk drive. Since this happens in real time, there is no possibility for any of your files to ever get corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Servers

We've avoided any possibility of files getting damaged silently because the servers where your semi-dedicated server account will be created use a powerful file system known as ZFS. Its main advantage over alternative file systems is that it uses a unique checksum for every single file - a digital fingerprint that is checked in real time. Since we store all content on numerous SSD drives, ZFS checks whether the fingerprint of a file on one drive corresponds to the one on the remaining drives and the one it has saved. When there is a mismatch, the corrupted copy is replaced with a good one from one of the other drives and because it happens in real time, there's no chance that a corrupted copy can remain on our web servers or that it could be duplicated to the other hard disks in the RAID. None of the other file systems work with this type of checks and what's more, even during a file system check right after a sudden power loss, none of them will detect silently corrupted files. In contrast, ZFS will not crash after a power loss and the continual checksum monitoring makes a time-consuming file system check unnecessary.