No Data Corruption & Data Integrity in Cloud Website Hosting
The integrity of the data which you upload to your new cloud website hosting account shall be guaranteed by the ZFS file system that we work with on our cloud platform. Most hosting providers, like our firm, use multiple hard drives to keep content and since the drives work in a RAID, identical information is synchronized between the drives at all times. In case a file on a drive becomes damaged for reasons unknown, yet, it is likely that it will be copied on the other drives since other file systems don't include special checks for this. Unlike them, ZFS applies a digital fingerprint, or a checksum, for each and every file. In the event that a file gets damaged, its checksum will not match what ZFS has as a record for it, and the bad copy shall be substituted with a good one from another hard drive. Since this happens immediately, there's no risk for any of your files to ever get corrupted.
No Data Corruption & Data Integrity in Semi-dedicated Servers
We've avoided any risk of files getting damaged silently since the servers where your semi-dedicated server account will be created take advantage of a powerful file system called ZFS. Its key advantage over various other file systems is that it uses a unique checksum for each file - a digital fingerprint that's checked in real time. As we store all content on multiple NVMe drives, ZFS checks whether the fingerprint of a file on one drive matches the one on the other drives and the one it has stored. In the event that there is a mismatch, the bad copy is replaced with a good one from one of the other drives and because this happens in real time, there's no chance that a corrupted copy can remain on our servers or that it can be copied to the other drives in the RAID. None of the other file systems include such checks and what's more, even during a file system check following a sudden power loss, none of them can detect silently corrupted files. In comparison, ZFS won't crash after a power failure and the continual checksum monitoring makes a time-consuming file system check unnecessary.