Data corruption is the damage of info because of various hardware or software failures. The moment a file is corrupted, it will no longer function as it should, so an app will not start or shall give errors, a text file will be partially or fully unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of data getting harmed without any identification by the system or an admin, which makes it a significant problem for hosting servers as failures are very likely to occur on larger hard disk drives where substantial volumes of information are stored. When a drive is part of a RAID and the information on it is duplicated on other drives for redundancy, it is more than likely that the damaged file will be treated as a regular one and it will be duplicated on all the drives, making the harm permanent. A huge number of the file systems that operate on web servers today often are unable to identify corrupted files immediately or they need time-consuming system checks during which the server is not functioning.

No Data Corruption & Data Integrity in Hosting

The integrity of the data which you upload to your new hosting account will be ensured by the ZFS file system that we work with on our cloud platform. The majority of web hosting providers, like our firm, use multiple HDDs to keep content and since the drives work in a RAID, the same data is synchronized between the drives all of the time. When a file on a drive is corrupted for some reason, yet, it is more than likely that it will be reproduced on the other drives since alternative file systems don't include special checks for this. Unlike them, ZFS employs a digital fingerprint, or a checksum, for each and every file. In case a file gets damaged, its checksum won't match what ZFS has as a record for it, so the bad copy shall be replaced with a good one from another disk drive. Since this happens right away, there is no risk for any of your files to ever get damaged.

No Data Corruption & Data Integrity in Semi-dedicated Servers

We have avoided any risk of files getting corrupted silently due to the fact that the servers where your semi-dedicated server account will be created work with a powerful file system named ZFS. Its key advantage over various other file systems is that it uses a unique checksum for each file - a digital fingerprint which is checked in real time. Since we store all content on a number of SSD drives, ZFS checks if the fingerprint of a file on one drive corresponds to the one on the other drives and the one it has saved. In case there is a mismatch, the bad copy is replaced with a healthy one from one of the other drives and since it happens instantly, there's no chance that a corrupted copy can remain on our web hosting servers or that it can be duplicated to the other hard disks in the RAID. None of the other file systems work with such checks and furthermore, even during a file system check following a sudden blackout, none of them will identify silently corrupted files. In contrast, ZFS doesn't crash after a blackout and the constant checksum monitoring makes a lenghty file system check unnecessary.