The process of files getting damaged as a result of some hardware or software failure is known as data corruption and this is among the main problems that web hosting companies face since the larger a hard disk is and the more data is stored on it, the more likely it is for data to be corrupted. You'll find several fail-safes, still often the information is damaged silently, so neither the file system, nor the admins see anything. Consequently, a corrupted file will be treated as a good one and if the hard drive is part of a RAID, that particular file will be copied on all other drives. In theory, this is for redundancy, but in practice the damage will be worse. When some file gets damaged, it will be partly or fully unreadable, so a text file will not be readable, an image file will display a random blend of colors in case it opens at all and an archive will be impossible to unpack, so you risk losing your site content. Although the most frequently used server file systems feature various checks, they frequently fail to detect some problem early enough or require an extensive time period to be able to check all the files and the web server will not be functional in the meantime.

No Data Corruption & Data Integrity in Web Hosting

If you host your websites in a web hosting account with our company, you don't have to worry about your data ever getting corrupted. We can guarantee that since our cloud hosting platform employs the cutting-edge ZFS file system. The latter is the only file system which uses checksums, or unique digital fingerprints, for every single file. Any info that you upload will be saved in a RAID i.e. simultaneously on many different SSDs. All file systems synchronize the files between the different drives using this kind of a setup, but there's no real guarantee that a file won't get corrupted. This may occur during the writing process on any drive and after that a damaged copy may be copied on the other drives. What makes the difference on our platform is that ZFS examines the checksums of all files on all of the drives immediately and in the event that a corrupted file is discovered, it is substituted with a good copy with the correct checksum from another drive. This way, your data will remain undamaged no matter what, even if an entire drive fails.