Since this command expects an array, the original hash is unwound into an array in such a way that the values follow their respective keys in the array.
This provides a mechanism for developers to decompose problems into tasks that can then be executed in parallel across arbitrary numbers of processor cores.