From Text to Token: How Tokenization Pipelines Work | Not Hacker News!