No Data Corruption & Data Integrity in Shared Hosting
We guarantee the integrity of the info uploaded in every single shared hosting account that is generated on our cloud platform due to the fact that we use the advanced ZFS file system. The latter is the only one that was designed to avert silent data corruption thanks to a unique checksum for each and every file. We shall store your info on multiple NVMe drives which function in a RAID, so exactly the same files will exist on several places at once. ZFS checks the digital fingerprint of all files on all of the drives in real time and if the checksum of any file is different from what it should be, the file system swaps that file with an undamaged copy from another drive from the RAID. There's no other file system that uses checksums, so it is possible for data to be silently corrupted and the bad file to be reproduced on all drives over time, but since that can never happen on a server using ZFS, you won't have to concern yourself with the integrity of your information.
No Data Corruption & Data Integrity in Semi-dedicated Hosting
You will not encounter any silent data corruption issues if you obtain one of our semi-dedicated hosting plans as the ZFS file system that we use on our cloud hosting platform uses checksums to guarantee that all the files are intact all the time. A checksum is a unique digital fingerprint which is assigned to each and every file kept on a server. Due to the fact that we store all content on multiple drives at the same time, the same file uses the same checksum on all drives and what ZFS does is that it compares the checksums between the different drives in real time. In case it detects that a file is corrupted and its checksum is different from what it has to be, it replaces that file with a healthy copy without delay, avoiding any chance of the bad copy to be synchronized on the other drives. ZFS is the only file system you will find that uses checksums, which makes it much more dependable than other file systems which are unable to identify silent data corruption and copy bad files across drives.