No Data Corruption & Data Integrity in Cloud Hosting
We've resolved the issue of silent data corruption on all our cloud hosting servers by using the amazing Z file system, or ZFS. The latter is better than other file systems since it is the only one in existence that checks all the files right away by employing a checksum - a digital identifier that's unique for each file. When you upload content to your account, it will be stored on several SSD drives and continually synced between them for redundancy. ZFS regularly compares the checksum of all files and when any file is detected as corrupted, it's replaced quickly with a good copy from another disk. As this happens in real time, there is no risk that a corrupted file may remain or may be duplicated on the other SSDs. ZFS needs a lot of physical memory in order to execute the real-time checks and the benefit of our cloud web hosting platform is that we use multiple powerful servers working together. If you host your websites with us, your data will be intact no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Servers
You won't experience any kind of silent data corruption issues should you get one of our semi-dedicated server packages because the ZFS file system that we work with on our cloud hosting platform uses checksums in order to ensure that all files are undamaged all the time. A checksum is a unique digital fingerprint which is assigned to each and every file saved on a server. Due to the fact that we store all content on a number of drives simultaneously, the same file has the same checksum on all drives and what ZFS does is that it compares the checksums between the different drives right away. In the event that it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy without delay, avoiding any chance of the corrupted copy to be synchronized on the remaining hard disks. ZFS is the only file system you can get which uses checksums, which makes it far superior to other file systems which cannot detect silent data corruption and duplicate bad files across hard drives.