Data corruption is the damage of information caused by various hardware or software failures. When a file is corrupted, it will no longer work properly, so an app will not start or shall give errors, a text file shall be partially or entirely unreadable, an archive will be impossible to open and unpack, etc. Silent data corruption is the process of data getting harmed without any identification by the system or an admin, which makes it a serious problem for hosting servers as failures are more likely to occur on larger in size hard disk drives where vast volumes of information are stored. If a drive is part of a RAID and the data on it is replicated on other drives for redundancy, it is very likely that the bad file will be treated as a standard one and will be duplicated on all the drives, making the harm permanent. Lots of the file systems which run on web servers these days often are not able to locate corrupted files in real time or they need time-consuming system checks through which the server isn't operational.

No Data Corruption & Data Integrity in Web Hosting

We guarantee the integrity of the info uploaded in every single web hosting account which is generated on our cloud platform because we use the advanced ZFS file system. The latter is the only one which was designed to prevent silent data corruption via a unique checksum for each and every file. We shall store your info on a number of SSD drives which function in a RAID, so the very same files will be accessible on several places simultaneously. ZFS checks the digital fingerprint of all the files on all drives in real time and if the checksum of any file is different from what it should be, the file system swaps that file with an undamaged version from some other drive in the RAID. No other file system uses checksums, so it is easy for data to become silently damaged and the bad file to be duplicated on all drives over time, but since that can never happen on a server using ZFS, you won't have to worry about the integrity of your information.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

We have avoided any risk of files getting corrupted silently because the servers where your semi-dedicated hosting account will be created employ a powerful file system called ZFS. Its basic advantage over various other file systems is that it uses a unique checksum for each and every file - a digital fingerprint that is checked in real time. Since we save all content on a number of SSD drives, ZFS checks whether the fingerprint of a file on one drive matches the one on the other drives and the one it has saved. If there is a mismatch, the damaged copy is replaced with a good one from one of the other drives and since it happens in real time, there's no chance that a damaged copy can remain on our hosting servers or that it could be copied to the other hard disks in the RAID. None of the other file systems work with such checks and furthermore, even during a file system check following an unexpected power loss, none of them will find silently corrupted files. In contrast, ZFS doesn't crash after a blackout and the regular checksum monitoring makes a time-consuming file system check obsolete.