Data corruption is the damage of data because of various software or hardware problems. After a file gets damaged, it will no longer function as it should, so an application will not start or will give errors, a text file could be partially or fully unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of info getting harmed without any acknowledgement by the system or an admin, which makes it a serious problem for website hosting servers as failures are more likely to occur on bigger hard drives where large volumes of information are located. If a drive is a part of a RAID and the data on it is replicated on other drives for redundancy, it is very likely that the damaged file will be treated as a healthy one and will be duplicated on all drives, making the harm permanent. A lot of the file systems which operate on web servers these days often cannot identify corrupted files instantly or they need time-consuming system checks through which the server is not working.

No Data Corruption & Data Integrity in Shared Hosting

The integrity of the data which you upload to your new shared hosting account will be guaranteed by the ZFS file system that we employ on our cloud platform. The majority of web hosting suppliers, including our firm, use multiple hard disk drives to store content and considering that the drives work in a RAID, the same data is synchronized between the drives all of the time. In case a file on a drive is damaged for whatever reason, however, it's more than likely that it will be reproduced on the other drives as alternative file systems don't feature special checks for that. Unlike them, ZFS employs a digital fingerprint, or a checksum, for every file. In case a file gets corrupted, its checksum won't match what ZFS has as a record for it, therefore the damaged copy will be substituted with a good one from another hard disk drive. Due to the fact that this happens right away, there is no possibility for any of your files to ever be corrupted.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you obtain one of our semi-dedicated hosting solutions, you will not need to be concerned about silent file corruption as we use ZFS - a high level file system that monitors all files in real time. Every time you upload a file to your account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. This file will be synced between a couple of NVMe drives for redundancy, so if a drive fails, the other ones will take control. ZFS compares the checksum of all the copies on the different drives and if it detects a corrupted copy, it replaces it with a healthy one from another drive. This is done instantly, so there will be no threat for any part of your content at any time. By comparison, all the other file systems execute checks after a system malfunction, but since they don't use anything similar to the checksums that ZFS uses, they will not detect silently corrupted files, so a bad copy may be replicated on the remaining drives as well and you can lose crucial info. Since this is not the case with ZFS, we can warrant the integrity of each and every file you upload no matter what.