No Data Corruption & Data Integrity in Hosting
We've dealt with the matter of silent data corruption on our hosting servers by using the hi-tech Z file system, or ZFS. The latter is more advanced than other file systems because it is the only one out there that checks all of the files right away by employing a checksum - a digital identifier that is unique for every single file. When you upload content to your account, it will be stored on several SSD drives and frequently synced between them for redundancy. ZFS constantly examines the checksum of all files and if any file is detected as damaged, it is replaced instantly with a good copy from some other disk. As this happens in real time, there is no risk that a bad file may remain or may be duplicated on the other SSDs. ZFS needs a lot of physical memory to execute the real-time checks and the benefit of our cloud web hosting platform is that we use multiple very powerful servers working together. If you host your websites with us, your information will be intact no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not experience any kind of silent data corruption issues if you buy one of our semi-dedicated hosting plans since the ZFS file system that we employ on our cloud hosting platform uses checksums in order to make sure that all of the files are intact at all times. A checksum is a unique digital fingerprint which is given to each and every file saved on a server. Since we store all content on multiple drives at the same time, the same file uses the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. In case it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy without delay, avoiding any possibility of the bad copy to be synchronized on the remaining drives. ZFS is the sole file system you can get that uses checksums, which makes it much more dependable than other file systems that cannot identify silent data corruption and duplicate bad files across hard drives.