No Data Corruption & Data Integrity in Hosting
We have resolved the problem of silent data corruption on our hosting servers by using the advanced Z file system, or ZFS. The latter is more advanced than other file systems because it is the only one out there which checks all the files immediately by using a checksum - a digital identifier that is unique for each file. When you upload content to your account, it will be stored on several SSD drives and constantly synced between them for redundancy. ZFS constantly compares the checksum of all files and if any file is detected as damaged, it's replaced promptly with a good copy from another disk. As this happens in real time, there is no risk that a damaged file may remain or may be duplicated on the remaining SSDs. ZFS requires plenty of physical memory in order to perform the real-time checks and the advantage of our cloud hosting platform is that we use multiple very powerful servers working together. If you host your sites with us, your data will be intact no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You won't need to deal with any silent data corruption issues whatsoever if you obtain one of our semi-dedicated hosting solutions as the ZFS file system that we use on our cloud hosting platform uses checksums in order to ensure that all the files are intact at all times. A checksum is a unique digital fingerprint which is allotted to each and every file stored on a server. As we store all content on multiple drives simultaneously, the same file uses the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. In case it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy without delay, avoiding any chance of the corrupted copy to be synchronized on the other hard drives. ZFS is the only file system you can find that uses checksums, which makes it much more dependable than other file systems which cannot identify silent data corruption and copy bad files across hard drives.