Data corruption is the accidental modification of a file or the loss of information which usually occurs during reading or writing. The reason can be hardware or software fail, and due to this fact, a file could become partially or entirely corrupted, so it will no longer work correctly since its bits shall be scrambled or lost. An image file, for instance, will no longer show an actual image, but a random combination of colors, an archive will be impossible to unpack since its content will be unreadable, and so on. When this kind of a problem occurs and it's not found by the system or by an admin, the data will be corrupted silently and in case this happens on a disk drive that is part of a RAID array where the data is synchronized between different drives, the corrupted file shall be duplicated on all the other drives and the harm will be long term. Many commonly used file systems either do not offer real-time checks or don't have good ones that will detect a problem before the damage is done, so silent data corruption is a common matter on hosting servers where substantial amounts of info are kept.
No Data Corruption & Data Integrity in Web Hosting
If you host your sites in a web hosting
account with our company, you do not have to worry about any of your data ever getting damaged. We can guarantee that due to the fact that our cloud hosting platform uses the reliable ZFS file system. The aforementioned is the only file system that works with checksums, or unique digital fingerprints, for each file. All of the data that you upload will be stored in a RAID i.e. simultaneously on a number of SSDs. All of the file systems synchronize the files between the separate drives with such a setup, but there's no real guarantee that a file won't get corrupted. This may happen at the time of the writing process on any drive and afterwards a bad copy can be copied on the rest of the drives. What makes the difference on our platform is that ZFS examines the checksums of all files on all drives live and in case a corrupted file is identified, it's swapped with a good copy with the correct checksum from some other drive. In this way, your information will stay undamaged no matter what, even if an entire drive fails.