Data corruption is the damage of info due to various hardware or software problems. Once a file is corrupted, it will no longer function correctly, so an app will not start or will give errors, a text file will be partially or entirely unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of info getting harmed without any identification by the system or an admin, which makes it a serious problem for hosting servers as failures are much more likely to happen on bigger hard drives where significant volumes of info are stored. If a drive is a part of a RAID and the information on it is copied on other drives for redundancy, it's more than likely that the damaged file will be treated as an undamaged one and it'll be copied on all the drives, making the harm permanent. A lot of the file systems that operate on web servers these days often cannot recognize corrupted files immediately or they need time-consuming system checks through which the server isn't operational.
No Data Corruption & Data Integrity in Web Hosting
The integrity of the data that you upload to your new web hosting account will be guaranteed by the ZFS file system that we take advantage of on our cloud platform. The vast majority of web hosting suppliers, including our firm, use multiple hard disk drives to keep content and considering that the drives work in a RAID, the same information is synchronized between the drives all of the time. If a file on a drive is corrupted for whatever reason, yet, it's more than likely that it will be reproduced on the other drives because alternative file systems don't feature special checks for that. Unlike them, ZFS uses a digital fingerprint, or a checksum, for each and every file. In the event that a file gets damaged, its checksum won't match what ZFS has as a record for it, therefore the damaged copy will be replaced with a good one from a different drive. Because this happens immediately, there's no risk for any of your files to ever be corrupted.
No Data Corruption & Data Integrity in Semi-dedicated Servers
We've avoided any risk of files getting corrupted silently due to the fact that the servers where your semi-dedicated server account will be created use a powerful file system known as ZFS. Its basic advantage over alternative file systems is that it uses a unique checksum for every single file - a digital fingerprint that's checked in real time. As we store all content on a number of NVMe drives, ZFS checks whether the fingerprint of a file on one drive corresponds to the one on the remaining drives and the one it has saved. In case there is a mismatch, the bad copy is replaced with a healthy one from one of the other drives and considering that it happens instantly, there's no chance that a corrupted copy can remain on our web servers or that it can be copied to the other drives in the RAID. None of the other file systems use this type of checks and furthermore, even during a file system check following a sudden power loss, none of them will detect silently corrupted files. In contrast, ZFS will not crash after a power failure and the regular checksum monitoring makes a time-consuming file system check unneeded.