Data corruption is the damage of info due to various hardware or software failures. When a file gets damaged, it will no longer work correctly, so an app will not start or shall give errors, a text file could be partially or fully unreadable, an archive will be impossible to open then unpack, etc. Silent data corruption is the process of data getting damaged without any acknowledgement by the system or an admin, which makes it a significant problem for website hosting servers as failures are much more likely to occur on larger hard disks where significant volumes of information are stored. In case a drive is part of a RAID and the data on it is replicated on other drives for redundancy, it's very likely that the bad file will be treated as a healthy one and it'll be copied on all the drives, making the harm permanent. A huge number of the file systems that run on web servers nowadays often are unable to discover corrupted files instantly or they need time-consuming system checks during which the server is not working.

No Data Corruption & Data Integrity in Semi-dedicated Hosting

You won't need to deal with any silent data corruption issues whatsoever should you acquire one of our semi-dedicated hosting solutions because the ZFS file system that we employ on our cloud hosting platform uses checksums in order to guarantee that all of your files are undamaged all the time. A checksum is a unique digital fingerprint that is given to each and every file kept on a server. As we store all content on a number of drives simultaneously, the same file has the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. When it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy without delay, avoiding any probability of the damaged copy to be synchronized on the other hard drives. ZFS is the only file system out there which uses checksums, which makes it far superior to other file systems which are unable to detect silent data corruption and duplicate bad files across hard drives.