No Data Corruption & Data Integrity in Hosting
We have dealt with the matter of silent data corruption on all of our hosting servers by using the state-of-the-art Z file system, or ZFS. The latter is better than other file systems because it is the only one out there that checks all the files immediately by employing a checksum - a digital identifier that is unique for each and every file. When you upload content to your account, it will be stored on several NVMe drives and constantly synchronized between them for redundancy. ZFS constantly analyzes the checksum of all files and if any file is detected as corrupted, it's replaced instantly with a good copy from some other disk. As this happens in real time, there's no risk that a damaged file may remain or may be copied on the rest of the NVMes. ZFS needs plenty of physical memory to perform the real-time checks and the advantage of our cloud hosting platform is that we employ multiple powerful servers working together. If you host your Internet sites with us, your info will be undamaged no matter what.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not experience any silent data corruption issues whatsoever if you get one of our semi-dedicated hosting packages because the ZFS file system that we work with on our cloud hosting platform uses checksums to guarantee that all files are intact all of the time. A checksum is a unique digital fingerprint that is allotted to each and every file saved on a server. As we store all content on multiple drives at the same time, the same file uses the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. If it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy right away, avoiding any probability of the bad copy to be synchronized on the other drives. ZFS is the sole file system out there which uses checksums, which makes it far superior to other file systems which are unable to identify silent data corruption and duplicate bad files across drives.