Data corruption is the damage of information because of various hardware or software failures. Once a file is corrupted, it will no longer work accurately, so an application will not start or will give errors, a text file will be partially or entirely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of information getting harmed without any identification by the system or an admin, which makes it a serious problem for hosting servers as fails are more likely to occur on larger hard disks where vast volumes of information are placed. When a drive is a part of a RAID and the data on it is replicated on other drives for redundancy, it's likely that the bad file will be treated as an ordinary one and will be copied on all drives, making the harm permanent. A huge number of the file systems that operate on web servers today often cannot discover corrupted files in real time or they need time-consuming system checks during which the server is not working.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data which you upload to your new cloud hosting account shall be ensured by the ZFS file system that we make use of on our cloud platform. Most of the internet hosting suppliers, like our company, use multiple HDDs to store content and since the drives work in a RAID, exactly the same data is synchronized between the drives at all times. If a file on a drive becomes corrupted for some reason, yet, it is more than likely that it will be copied on the other drives because alternative file systems don't offer special checks for that. Unlike them, ZFS works with a digital fingerprint, or a checksum, for each file. In the event that a file gets damaged, its checksum won't match what ZFS has as a record for it, and the damaged copy will be replaced with a good one from a different drive. Because this happens in real time, there's no risk for any of your files to ever get corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you acquire one of our semi-dedicated hosting packages, you won't have to be concerned about silent data corruption since we use ZFS - a high level file system that monitors all files in real time. Every time you upload a file to your hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between several SSD drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all of the copies on the different drives and in case it detects a damaged copy, it replaces it with a healthy one from another drive. This is done instantly, so there will be no threat for any part of your content at any moment. By comparison, all the other file systems execute checks only after a system failure, but since they do not use anything similar to the checksums which ZFS uses, they won't detect silently corrupted files, so a bad copy can be replicated on the rest of the disks as well and you could lose important information. As this isn't the case with ZFS, we're able to warrant the integrity of every single file you upload no matter what.