No Data Corruption & Data Integrity in Shared Hosting
We've tackled the problem of silent data corruption on our shared hosting servers by using the hi-tech Z file system, or ZFS. The latter is better than other file systems since it is the only one in existence which checks all of the files right away by employing a checksum - a digital identifier that's unique for each and every file. When you upload content to your account, it will be stored on several SSD drives and continually synchronized between them for redundancy. ZFS regularly examines the checksum of all files and in case any file is detected as corrupted, it is replaced quickly with a good copy from some other disk. As this happens in real time, there is no risk that a corrupted file may remain or may be copied on the remaining SSDs. ZFS needs a lot of physical memory to carry out the real-time checks and the advantage of our cloud hosting platform is that we employ multiple powerful servers working together. In case you host your sites with us, your info will be intact no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Servers
You will not encounter any silent data corruption issues if you get one of our semi-dedicated server plans because the ZFS file system that we work with on our cloud hosting platform uses checksums in order to make sure that all the files are undamaged at all times. A checksum is a unique digital fingerprint which is given to each and every file saved on a server. As we store all content on multiple drives at the same time, the same file uses the same checksum on all drives and what ZFS does is that it compares the checksums between the different drives right away. In the event that it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy right away, avoiding any probability of the bad copy to be synchronized on the rest of the hard disks. ZFS is the only file system out there that uses checksums, which makes it far superior to other file systems that are not able to identify silent data corruption and duplicate bad files across drives.