No Data Corruption & Data Integrity in Cloud Hosting
We have tackled the issue of silent data corruption on all of our cloud hosting servers by using the hi-tech Z file system, or ZFS. The latter is more advanced than other file systems as it is the only one on the market which checks all files right away by using a checksum - a digital identifier which is unique for each file. When you upload content to your account, it'll be stored on several NVMe drives and continually synchronized between them for redundancy. ZFS constantly examines the checksum of all files and when any file is detected as damaged, it is replaced right away with a good copy from some other disk. As this happens in real time, there is no risk that a bad file may remain or may be copied on the remaining NVMes. ZFS requires lots of physical memory in order to carry out the real-time checks and the benefit of our cloud website hosting platform is that we use multiple powerful servers working together. If you host your websites with us, your information will be undamaged no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You won't experience any kind of silent data corruption issues should you obtain one of our semi-dedicated hosting plans as the ZFS file system that we use on our cloud hosting platform uses checksums to guarantee that all files are undamaged all of the time. A checksum is a unique digital fingerprint which is allotted to each and every file stored on a server. As we store all content on multiple drives at the same time, the same file uses the same checksum on all the drives and what ZFS does is that it compares the checksums between the different drives in real time. In case it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy right away, avoiding any probability of the bad copy to be synchronized on the remaining drives. ZFS is the sole file system on the market which uses checksums, which makes it much more dependable than other file systems that cannot identify silent data corruption and duplicate bad files across hard drives.