Data corruption is the damage of data caused by various software or hardware fails. When a file is corrupted, it will no longer function as it should, so an app will not start or will give errors, a text file will be partially or entirely unreadable, an archive file will be impossible to open and unpack, etc. Silent data corruption is the process of data getting damaged without any identification by the system or an administrator, which makes it a significant problem for hosting servers as problems are more likely to happen on larger hard disk drives where considerable volumes of info are placed. When a drive is a part of a RAID and the information on it is replicated on other drives for redundancy, it is very likely that the damaged file will be treated as a regular one and it will be duplicated on all of the drives, making the damage permanent. A lot of the file systems which run on web servers nowadays often are not able to locate corrupted files right away or they need time-consuming system checks through which the server is not working.

No Data Corruption & Data Integrity in Web Hosting

The integrity of the data which you upload to your new web hosting account shall be guaranteed by the ZFS file system which we take advantage of on our cloud platform. The majority of web hosting suppliers, including our company, use multiple HDDs to store content and because the drives work in a RAID, identical data is synchronized between the drives all the time. If a file on a drive becomes corrupted for reasons unknown, yet, it's likely that it will be copied on the other drives because alternative file systems do not include special checks for this. Unlike them, ZFS applies a digital fingerprint, or a checksum, for every file. If a file gets corrupted, its checksum will not match what ZFS has as a record for it, so the damaged copy will be replaced with a good one from a different hard disk drive. Due to the fact that this happens in real time, there's no risk for any of your files to ever be corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you purchase one of our semi-dedicated hosting solutions, you will not need to worry about silent file corruption because we use ZFS - an advanced file system which monitors all of the files in real time. Every time you upload a file to your website hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synced between a number of SSD drives for redundancy, so if a drive fails, the other ones will take control. ZFS compares the checksum of all the copies on the different drives and if it detects a damaged copy, it replaces it with a healthy one from a different drive. This is done instantly, so there will be no danger for any part of your content at any moment. In contrast, all of the other file systems perform checks only after a system failure, but since they don't use anything similar to the checksums that ZFS uses, they won't detect silently corrupted files, so a bad copy may be replicated on the other drives as well and you can lose crucial information. Since this is not the case with ZFS, we are able to warrant the integrity of every single file you upload no matter what.