Data corruption is the damage of data due to various software or hardware fails. After a file is damaged, it will no longer function correctly, so an application will not start or shall give errors, a text file shall be partially or fully unreadable, an archive file will be impossible to open then unpack, etc. Silent data corruption is the process of data getting damaged without any identification by the system or an admin, that makes it a serious problem for hosting servers as fails are more likely to happen on larger in size hard disks where significant volumes of info are placed. If a drive is part of a RAID and the data on it is replicated on other drives for redundancy, it's more than likely that the bad file will be treated as an ordinary one and it'll be duplicated on all of the drives, making the harm permanent. A lot of the file systems which operate on web servers these days often are not able to discover corrupted files right away or they need time-consuming system checks during which the server isn't operational.

No Data Corruption & Data Integrity in Cloud Hosting

The integrity of the data that you upload to your new cloud hosting account shall be guaranteed by the ZFS file system which we work with on our cloud platform. Most of the hosting suppliers, like our company, use multiple hard disks to keep content and considering that the drives work in a RAID, identical information is synchronized between the drives all of the time. When a file on a drive becomes corrupted for reasons unknown, however, it's very likely that it will be duplicated on the other drives because alternative file systems don't offer special checks for that. Unlike them, ZFS employs a digital fingerprint, or a checksum, for each and every file. In the event that a file gets damaged, its checksum will not match what ZFS has as a record for it, which means that the damaged copy shall be swapped with a good one from another drive. Because this happens in real time, there is no risk for any of your files to ever be damaged.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

You will not encounter any silent data corruption issues if you purchase one of our semi-dedicated hosting packages as the ZFS file system that we work with on our cloud hosting platform uses checksums in order to make sure that all files are undamaged all the time. A checksum is a unique digital fingerprint which is allotted to each and every file stored on a server. Because we store all content on multiple drives at the same time, the same file has the same checksum on all the drives and what ZFS does is that it compares the checksums between the different drives right away. In the event that it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy without delay, avoiding any probability of the bad copy to be synchronized on the rest of the drives. ZFS is the only file system out there that uses checksums, which makes it far superior to other file systems which cannot identify silent data corruption and copy bad files across drives.