Data corruption is the damage of data because of various hardware or software fails. Once a file is damaged, it will no longer function correctly, so an app will not start or shall give errors, a text file could be partially or completely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of info getting harmed without any identification by the system or an admin, which makes it a significant problem for hosting servers as problems are more likely to occur on larger hard drives where considerable volumes of information are stored. If a drive is part of a RAID and the information on it is duplicated on other drives for redundancy, it is very likely that the damaged file will be treated as an ordinary one and it'll be duplicated on all of the drives, making the harm permanent. A lot of the file systems which operate on web servers today often are not able to find corrupted files instantly or they need time-consuming system checks through which the server isn't operational.

No Data Corruption & Data Integrity in Web Hosting

We've tackled the problem of silent data corruption on all of our web hosting servers by using the amazing Z file system, or ZFS. The latter is better than other file systems because it is the only one on the market that checks all of the files instantly by using a checksum - a digital identifier which is unique for each file. When you upload content to your account, it will be stored on several SSD drives and continually synced between them for redundancy. ZFS constantly analyzes the checksum of all files and in case any file is detected as corrupted, it is replaced immediately with a good copy from some other disk. As this happens in real time, there's no risk that a bad file may remain or may be duplicated on the remaining SSDs. ZFS needs a lot of physical memory to execute the real-time checks and the benefit of our cloud website hosting platform is that we employ multiple powerful servers working together. If you host your Internet sites with us, your information will be undamaged no matter what.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

We have avoided any possibility of files getting damaged silently due to the fact that the servers where your semi-dedicated hosting account will be created take advantage of a powerful file system known as ZFS. Its main advantage over other file systems is that it uses a unique checksum for every single file - a digital fingerprint that's checked in real time. As we keep all content on numerous SSD drives, ZFS checks whether the fingerprint of a file on one drive corresponds to the one on the remaining drives and the one it has stored. If there's a mismatch, the damaged copy is replaced with a good one from one of the other drives and because it happens right away, there is no chance that a corrupted copy can remain on our website hosting servers or that it could be duplicated to the other drives in the RAID. None of the other file systems use this type of checks and in addition, even during a file system check following an unexpected power loss, none of them will find silently corrupted files. In contrast, ZFS will not crash after a blackout and the regular checksum monitoring makes a lenghty file system check unneeded.