Data corruption is the damage of data because of various hardware or software failures. When a file is damaged, it will no longer work as it should, so an app will not start or shall give errors, a text file will be partially or entirely unreadable, an archive will be impossible to open and unpack, etc. Silent data corruption is the process of information getting damaged without any identification by the system or an admin, which makes it a significant problem for hosting servers as problems are very likely to happen on larger in size hard disk drives where large volumes of info are located. If a drive is a part of a RAID and the information on it is copied on other drives for redundancy, it's more than likely that the bad file will be treated as a healthy one and it will be duplicated on all of the drives, making the harm permanent. Lots of the file systems which operate on web servers nowadays often are unable to recognize corrupted files immediately or they need time-consuming system checks during which the server is not working.

No Data Corruption & Data Integrity in Shared Web Hosting

The integrity of the data that you upload to your new shared web hosting account shall be ensured by the ZFS file system which we work with on our cloud platform. The majority of internet hosting service providers, like our firm, use multiple hard disks to store content and considering that the drives work in a RAID, identical information is synchronized between the drives all of the time. When a file on a drive gets damaged for whatever reason, however, it is very likely that it will be copied on the other drives since alternative file systems do not include special checks for that. Unlike them, ZFS uses a digital fingerprint, or a checksum, for each file. In the event that a file gets damaged, its checksum will not match what ZFS has as a record for it, therefore the damaged copy will be replaced with a good one from a different hard disk drive. Because this happens in real time, there's no risk for any of your files to ever be corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

In case you buy one of our semi-dedicated hosting plans, you won't need to be concerned about silent data corruption since we use ZFS - a high level file system which checks all of the files in real time. Whenever you upload a file to your web hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between a number of NVMe drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all of the copies on the different drives and when it detects a corrupted copy, it replaces it with a healthy one from a different drive. This happens in real time, so there will be no threat for any part of your content at any time. In contrast, alternative file systems perform checks after a system failure, but since they do not use anything similar to the checksums that ZFS uses, they are unable to detect silently corrupted files, so a corrupted copy could be replicated on the rest of the disks as well and you can lose crucial data. Since this is not the case with ZFS, we can warrant the integrity of every single file you upload no matter what.