Data corruption is the damage of data caused by various software or hardware failures. Once a file is damaged, it will no longer function properly, so an app will not start or shall give errors, a text file will be partially or fully unreadable, an archive file will be impossible to open and then unpack, etc. Silent data corruption is the process of information getting harmed without any acknowledgement by the system or an admin, which makes it a serious problem for hosting servers as fails are very likely to occur on larger hard disks where considerable volumes of information are placed. If a drive is a part of a RAID and the information on it is replicated on other drives for redundancy, it's more than likely that the bad file will be treated as a healthy one and will be duplicated on all of the drives, making the harm permanent. Lots of the file systems which run on web servers nowadays often cannot discover corrupted files in real time or they need time-consuming system checks through which the server isn't working.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data which you upload to your new cloud hosting account shall be ensured by the ZFS file system that we make use of on our cloud platform. Most internet hosting providers, like our company, use multiple HDDs to store content and because the drives work in a RAID, the same information is synchronized between the drives at all times. If a file on a drive is damaged for whatever reason, however, it's very likely that it will be copied on the other drives since other file systems do not have special checks for that. Unlike them, ZFS works with a digital fingerprint, or a checksum, for each and every file. If a file gets corrupted, its checksum will not match what ZFS has as a record for it, which means that the bad copy shall be swapped with a good one from a different hard disk. Because this happens in real time, there's no risk for any of your files to ever get corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you acquire one of our semi-dedicated hosting solutions, you will not need to be concerned about silent file corruption since we use ZFS - a high level file system which keeps track of all of the files in real time. Every time you upload a file to your web hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. This file will be synced between a couple of NVMe drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all copies on the different drives and if it detects a corrupted copy, it replaces it with a healthy one from another drive. This is done right away, so there will be no danger for any part of your content at any moment. By comparison, all of the other file systems perform checks after a system breakdown, but since they do not use anything similar to the checksums which ZFS uses, they are unable to detect silently corrupted files, so a corrupted copy could be replicated on the rest of the disks as well and you can lose critical info. Since this is not the case with ZFS, we warrant the integrity of each file you upload no matter what.