Data corruption is the damage of information because of various software or hardware fails. The moment a file is damaged, it will no longer work as it should, so an app will not start or will give errors, a text file will be partially or entirely unreadable, an archive file will be impossible to open and then unpack, etc. Silent data corruption is the process of info getting harmed without any identification by the system or an administrator, that makes it a serious problem for web hosting servers as failures are much more likely to occur on bigger hard disk drives where vast volumes of information are located. When a drive is part of a RAID and the information on it is copied on other drives for redundancy, it is more than likely that the damaged file will be treated as a good one and it will be duplicated on all the drives, making the damage permanent. Lots of the file systems that operate on web servers nowadays often cannot recognize corrupted files right away or they need time-consuming system checks through which the server isn't operational.

No Data Corruption & Data Integrity in Cloud Web Hosting

The integrity of the data which you upload to your new cloud web hosting account will be ensured by the ZFS file system that we make use of on our cloud platform. The vast majority of web hosting providers, like our firm, use multiple HDDs to keep content and because the drives work in a RAID, identical data is synchronized between the drives all the time. In case a file on a drive becomes corrupted for some reason, yet, it's very likely that it will be copied on the other drives as alternative file systems do not feature special checks for that. Unlike them, ZFS works with a digital fingerprint, or a checksum, for each file. In case a file gets damaged, its checksum won't match what ZFS has as a record for it, and the damaged copy shall be replaced with a good one from another disk drive. Since this happens in real time, there's no risk for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you acquire one of our semi-dedicated hosting plans, you won't need to be concerned about silent file corruption because we use ZFS - an advanced file system which monitors all files in real time. Each time you upload a file to your hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between multiple NVMe drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all the copies on the different drives and if it detects a corrupted copy, it replaces it with a healthy one from another drive. This happens immediately, so there will be no danger for any part of your content at any moment. In contrast, all of the other file systems execute checks after a system malfunction, but since they do not use anything similar to the checksums which ZFS uses, they can't detect silently corrupted files, so a corrupted copy could be replicated on the other drives as well and you may lose important info. Since this is not the case with ZFS, we can guarantee the integrity of each file you upload no matter what.