No Data Corruption & Data Integrity
Learn what ‘No Data Corruption & Data Integrity’ indicates for the info as part of your website hosting account.
Data corruption is the damage of data caused by various hardware or software fails. The moment a file is damaged, it will no longer work properly, so an app will not start or shall give errors, a text file can be partially or fully unreadable, an archive file will be impossible to open and then unpack, etc. Silent data corruption is the process of info getting harmed without any identification by the system or an admin, which makes it a serious problem for web hosting servers as fails are much more likely to happen on larger in size hard disks where substantial volumes of info are placed. In case a drive is a part of a RAID and the data on it is duplicated on other drives for redundancy, it is likely that the damaged file will be treated as a healthy one and will be duplicated on all drives, making the harm permanent. A lot of the file systems which run on web servers today often are unable to locate corrupted files immediately or they need time-consuming system checks during which the server is not functioning.
-
No Data Corruption & Data Integrity in Cloud Website Hosting
If you host your Internet sites in a
cloud website hosting account with our firm, you don't have to worry about any of your data ever getting damaged. We can ensure that due to the fact that our cloud hosting platform works with the leading-edge ZFS file system. The latter is the only file system which uses checksums, or unique digital fingerprints, for each file. Any info that you upload will be kept in a RAID i.e. simultaneously on many different NVMe drives. All file systems synchronize the files between the different drives using this kind of a setup, but there's no real guarantee that a file will not get corrupted. This could occur at the time of the writing process on any drive and then a corrupted copy may be copied on the rest of the drives. What is different on our platform is that ZFS analyzes the checksums of all files on all of the drives in real time and when a corrupted file is located, it is swapped with a good copy with the correct checksum from another drive. This way, your information will stay intact no matter what, even if a whole drive fails.