No Data Corruption & Data Integrity in Cloud Web Hosting
The integrity of the data which you upload to your new cloud web hosting account shall be ensured by the ZFS file system that we take advantage of on our cloud platform. The vast majority of hosting suppliers, including our company, use multiple hard drives to store content and considering that the drives work in a RAID, exactly the same information is synchronized between the drives all the time. In case a file on a drive becomes damaged for some reason, yet, it is likely that it will be reproduced on the other drives because other file systems do not offer special checks for that. In contrast to them, ZFS uses a digital fingerprint, or a checksum, for every file. In case a file gets damaged, its checksum will not match what ZFS has as a record for it, which means that the bad copy shall be swapped with a good one from a different hard disk drive. Because this happens immediately, there is no risk for any of your files to ever get damaged.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You won't need to deal with any silent data corruption issues whatsoever should you acquire one of our semi-dedicated hosting packages as the ZFS file system that we employ on our cloud hosting platform uses checksums in order to ensure that all of your files are undamaged at all times. A checksum is a unique digital fingerprint which is assigned to each and every file stored on a server. Because we store all content on a number of drives at the same time, the same file uses the same checksum on all the drives and what ZFS does is that it compares the checksums between the different drives right away. In the event that it detects that a file is corrupted and its checksum is different from what it should be, it replaces that file with a healthy copy without delay, avoiding any possibility of the corrupted copy to be synchronized on the other drives. ZFS is the sole file system you can get that uses checksums, which makes it far superior to other file systems that are not able to detect silent data corruption and copy bad files across drives.