2023-02-01T03:13:15Z
https://rdf-sak.ibis.makethingsmakesense.com/266e387a-13b6-45de-a29f-1cc843732f99
Model these operations as pure transformation functions.
These functions necessarily return a representation which can be memoized and keyed by its cryptographic hash.