Data corruption is the unintentional transformation of a file or the loss of information that usually occurs during reading or writing. The reason can be hardware or software failure, and as a consequence, a file could become partially or entirely corrupted, so it'll no longer work properly since its bits shall be scrambled or lacking. An image file, for example, will no longer display an accurate image, but a random combination of colors, an archive will be impossible to unpack since its content will be unreadable, etc. In case this kind of an issue occurs and it is not identified by the system or by an administrator, the data will become corrupted silently and when this happens on a drive that's part of a RAID array where the information is synchronized between various different drives, the corrupted file will be replicated on all of the other drives and the damage will become permanent. Many widely used file systems either do not offer real-time checks or do not have good ones which can detect an issue before the damage is done, so silent data corruption is a very common matter on web hosting servers where huge amounts of info are kept.

No Data Corruption & Data Integrity in Website Hosting

If you host your sites in a website hosting account with our firm, you don't have to worry about any of your data ever getting damaged. We can ensure that due to the fact that our cloud hosting platform employs the leading-edge ZFS file system. The latter is the only file system which uses checksums, or unique digital fingerprints, for each file. All the information that you upload will be stored in a RAID i.e. simultaneously on many different SSDs. Many file systems synchronize the files between the separate drives with this kind of a setup, but there is no real warranty that a file won't get corrupted. This could happen throughout the writing process on each drive and afterwards a damaged copy may be copied on the rest of the drives. What is different on our platform is the fact that ZFS analyzes the checksums of all files on all drives immediately and when a corrupted file is located, it's substituted with a good copy with the correct checksum from another drive. This way, your info will remain undamaged no matter what, even if an entire drive fails.