No Data Corruption & Data Integrity in Hosting
We guarantee the integrity of the information uploaded in each and every hosting account which is made on our cloud platform due to the fact that we work with the advanced ZFS file system. The latter is the only one that was designed to avoid silent data corruption through a unique checksum for each file. We'll store your info on a large number of SSD drives which function in a RAID, so the same files will be available on several places at the same time. ZFS checks the digital fingerprint of all files on all the drives in real time and in case the checksum of any file differs from what it should be, the file system replaces that file with an undamaged version from some other drive within the RAID. No other file system uses checksums, so it is possible for data to be silently corrupted and the bad file to be replicated on all drives over time, but since that can never happen on a server using ZFS, you won't have to worry about the integrity of your info.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You won't have to deal with any kind of silent data corruption issues in case you purchase one of our semi-dedicated hosting solutions as the ZFS file system that we employ on our cloud hosting platform uses checksums to ensure that all of the files are undamaged at all times. A checksum is a unique digital fingerprint which is allotted to each and every file saved on a server. Due to the fact that we store all content on a number of drives at the same time, the same file has the same checksum on all of the drives and what ZFS does is that it compares the checksums between the different drives in real time. When it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy right away, avoiding any chance of the damaged copy to be synchronized on the rest of the hard drives. ZFS is the sole file system you can find which uses checksums, which makes it much more dependable than other file systems which are unable to identify silent data corruption and copy bad files across hard drives.