No Data Corruption & Data Integrity in Cloud Web Hosting
The integrity of the data which you upload to your new cloud web hosting account shall be ensured by the ZFS file system which we employ on our cloud platform. The vast majority of web hosting suppliers, including our company, use multiple hard drives to store content and considering that the drives work in a RAID, identical information is synchronized between the drives at all times. If a file on a drive becomes corrupted for whatever reason, however, it is more than likely that it will be reproduced on the other drives because alternative file systems do not feature special checks for this. Unlike them, ZFS uses a digital fingerprint, or a checksum, for every single file. In the event that a file gets damaged, its checksum won't match what ZFS has as a record for it, and the damaged copy will be swapped with a good one from another hard disk. Since this happens right away, there's no possibility for any of your files to ever be damaged.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not have to deal with any kind of silent data corruption issues whatsoever if you buy one of our semi-dedicated hosting packages since the ZFS file system that we employ on our cloud hosting platform uses checksums in order to guarantee that all of the files are undamaged all the time. A checksum is a unique digital fingerprint that is allotted to each and every file stored on a server. Due to the fact that we store all content on multiple drives simultaneously, the same file has the same checksum on all drives and what ZFS does is that it compares the checksums between the different drives in real time. When it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy without delay, avoiding any probability of the corrupted copy to be synchronized on the rest of the hard disks. ZFS is the sole file system on the market which uses checksums, which makes it far superior to other file systems that cannot identify silent data corruption and duplicate bad files across drives.