Data corruption is the damage of data caused by various software or hardware problems. The moment a file is damaged, it will no longer function properly, so an app will not start or will give errors, a text file shall be partially or completely unreadable, an archive file will be impossible to open and then unpack, etc. Silent data corruption is the process of information getting harmed without any identification by the system or an admin, which makes it a significant problem for hosting servers as problems are much more likely to occur on larger hard drives where large volumes of info are kept. In case a drive is part of a RAID and the data on it is replicated on other drives for redundancy, it's likely that the damaged file will be treated as a healthy one and it'll be duplicated on all drives, making the damage permanent. Lots of the file systems which operate on web servers nowadays often are unable to find corrupted files in real time or they need time-consuming system checks through which the server is not working.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data which you upload to your new cloud hosting account shall be guaranteed by the ZFS file system that we take advantage of on our cloud platform. The vast majority of hosting providers, like our company, use multiple HDDs to store content and because the drives work in a RAID, the same information is synchronized between the drives at all times. If a file on a drive becomes corrupted for some reason, however, it's likely that it will be reproduced on the other drives since alternative file systems don't include special checks for that. In contrast to them, ZFS applies a digital fingerprint, or a checksum, for each file. In the event that a file gets corrupted, its checksum won't match what ZFS has as a record for it, which means that the bad copy shall be substituted with a good one from a different hard disk drive. Due to the fact that this happens instantly, there's no possibility for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

If you acquire one of our semi-dedicated hosting plans, you won't need to worry about silent file corruption since we use ZFS - a high level file system that monitors all files in real time. Whenever you upload a file to your web hosting account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between several SSD drives for redundancy, so if one drive fails, the other ones will take control. ZFS compares the checksum of all copies on the different drives and if it detects a corrupted copy, it replaces it with a healthy one from another drive. This happens in real time, so there will be no threat for any part of your content at any moment. In comparison, other file systems carry out checks only after a system failure, but since they don't use anything similar to the checksums that ZFS uses, they are unable to detect silently corrupted files, so a bad copy can be replicated on the rest of the drives as well and you can lose precious information. Because this is not the case with ZFS, we can guarantee the integrity of every single file you upload no matter what.