Five LLM Tricks for Data Pipelines | Not Hacker News!