No Data Corruption & Data Integrity
What exactly does the 'No Data Corruption & Data Integrity' motto mean to every Internet hosting account user?
Data corruption is the damage of information due to various hardware or software fails. The moment a file gets damaged, it will no longer function as it should, so an app will not start or will give errors, a text file shall be partially or fully unreadable, an archive file will be impossible to open and unpack, etc. Silent data corruption is the process of information getting harmed without any identification by the system or an admin, that makes it a significant problem for web hosting servers as problems are very likely to occur on larger hard drives where large volumes of information are stored. When a drive is a part of a RAID and the info on it is duplicated on other drives for redundancy, it is more than likely that the bad file will be treated as an undamaged one and will be duplicated on all of the drives, making the harm permanent. A lot of the file systems that operate on web servers today often are not able to recognize corrupted files instantly or they need time-consuming system checks through which the server isn't operational.
No Data Corruption & Data Integrity in Cloud Website Hosting
In case you host your sites in a cloud website hosting
account from our firm, you will not have to worry about your data ever getting corrupted. We can ensure that because our cloud hosting platform employs the amazing ZFS file system. The aforementioned is the only file system which uses checksums, or unique digital fingerprints, for each and every file. All the info that you upload will be stored in a RAID i.e. simultaneously on multiple SSD drives. All the file systems synchronize the files between the separate drives using this type of a setup, but there is no real guarantee that a file won't get corrupted. This could occur during the writing process on any drive and afterwards a bad copy can be copied on the rest of the drives. What makes the difference on our platform is the fact that ZFS analyzes the checksums of all files on all drives right away and in case a corrupted file is identified, it is substituted with a good copy with the correct checksum from another drive. This way, your data will stay unharmed no matter what, even if a whole drive fails.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
In case you buy one of our semi-dedicated hosting
packages, you will not need to be concerned about silent data corruption because we use ZFS - a high level file system that keeps track of all files in real time. Whenever you upload a file to your account, ZFS will assign a unique digital fingerprint to it - the so-called checksum. That file will be synchronized between multiple SSD drives for redundancy, so if a drive fails, the other ones will take over. ZFS compares the checksum of all the copies on the different drives and when it detects a corrupted copy, it replaces it with a healthy one from a different drive. This is done in real time, so there will be no danger for any part of your content at any time. By comparison, all of the other file systems carry out checks after a system breakdown, but since they do not use anything similar to the checksums which ZFS uses, they are unable to detect silently corrupted files, so a bad copy can be replicated on the other drives as well and you could lose crucial data. Since this is not the case with ZFS, we're able to guarantee the integrity of each file you upload no matter what.