No Data Corruption & Data Integrity in Hosting
We have tackled the issue of silent data corruption on our hosting servers by using the state-of-the-art Z file system, or ZFS. The latter is more advanced than other file systems since it is the only one in existence which checks all the files instantly by employing a checksum - a digital identifier that is unique for each and every file. When you upload content to your account, it will be stored on several NVMe drives and continually synced between them for redundancy. ZFS regularly examines the checksum of all files and in the event that any file is detected as corrupted, it is replaced right away with a good copy from some other disk. As this happens in real time, there's no risk that a corrupted file may remain or may be copied on the remaining NVMes. ZFS needs a lot of physical memory in order to carry out the real-time checks and the advantage of our cloud web hosting platform is that we use multiple very powerful servers working together. If you host your sites with us, your information will be undamaged no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not have to deal with any kind of silent data corruption issues whatsoever if you get one of our semi-dedicated hosting solutions as the ZFS file system that we employ on our cloud hosting platform uses checksums to make sure that all files are intact all the time. A checksum is a unique digital fingerprint that is given to each and every file kept on a server. As we store all content on multiple drives at the same time, the same file has the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. When it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy right away, avoiding any chance of the bad copy to be synchronized on the remaining drives. ZFS is the only file system out there that uses checksums, which makes it far superior to other file systems that are unable to detect silent data corruption and duplicate bad files across hard drives.