No Data Corruption & Data Integrity in Cloud Hosting
We have resolved the issue of silent data corruption on all of our cloud hosting servers by using the hi-tech Z file system, or ZFS. The latter is superior to other file systems as it is the only one on the market which checks all the files immediately by employing a checksum - a digital identifier which is unique for each file. When you upload content to your account, it'll be stored on several SSD drives and frequently synced between them for redundancy. ZFS constantly examines the checksum of all files and in case any file is detected as corrupted, it's replaced promptly with a good copy from another disk. As this happens in real time, there's no risk that a bad file may remain or may be copied on the other SSDs. ZFS needs lots of physical memory to execute the real-time checks and the benefit of our cloud website hosting platform is that we employ multiple powerful servers working together. If you host your Internet sites with us, your info will be undamaged no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not experience any silent data corruption issues whatsoever should you purchase one of our semi-dedicated hosting plans since the ZFS file system that we take advantage of on our cloud hosting platform uses checksums to make sure that all of your files are intact all of the time. A checksum is a unique digital fingerprint which is given to each and every file kept on a server. Since we store all content on a number of drives at the same time, the same file has the same checksum on all the drives and what ZFS does is that it compares the checksums between the different drives in real time. When it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy right away, avoiding any chance of the damaged copy to be synchronized on the remaining drives. ZFS is the sole file system you can get which uses checksums, which makes it far superior to other file systems which are not able to identify silent data corruption and copy bad files across drives.