Contact Us
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
573 Articles
Stay up-to-date on B2B Tech
Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Media, conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

AIFeb 11

Large Multimodal Models (LMMs) vs LLMs

We evaluated the performance of Large Multimodal Models (LMMs) in financial reasoning tasks using a carefully selected dataset. By analyzing a subset of high-quality financial samples, we assess the models’ capabilities in processing and reasoning with multimodal data in the financial domain. The methodology section provides detailed insights into the dataset and evaluation framework employed.

Enterprise SoftwareFeb 11

Top 7 Open Source HRIS Tools with Key Features

Open-source HRIS software provides a more affordable alternative to closed-source code HR information system tools, although they have some limitations, such as vulnerabilities from open source. These systems are widely used for their flexibility and cost-effectiveness. We’ve gathered a selection of commonly used open-source HRIS tools, each with its own set of features.

AIFeb 11

Banking Chatbots: 8 Tools, 5 Use Cases & 5 Practices

Industries where customer service is a top priority face increasing costs due to the demand for excellent customer service. Banking chatbots enable customers to complete transactions via voice or text, reducing operational costs and enhancing customer satisfaction.

DataFeb 11

2026 Web Crawler Guide: From Indexing to Agentic Intelligence

Have you ever wondered how search engines such as Google and Bing collect all the data they present in their search results? Search engines index all the pages in their archives so they can return the most relevant results for queries. Web crawlers enable search engines to handle this process.

Agentic AIFeb 11

20+ AI Agent Builders: Microsoft, CrewAI, LangGraph and More

After reviewing the documentation and spending several hours tinkering with these AI agent builders, we listed the best open-source frameworks and low-code/no-code platforms. To highlight AI agent builder use cases we provided a tutorial on building a product expert agent with CrewAI.

Enterprise SoftwareFeb 11

Top 12 Workload Automation Tools of 2026: Vendor Benchmark

We compare 7 workload automation tools. In our screening, we used three criteria. 100+ employee size on LinkedIn, 3M+ funding or revenue and reference from a Fortune 500 company.

AIFeb 11

World Foundation Models: 10 Use Cases

Training robots and autonomous vehicles (AVs) in the physical world can be costly, time-consuming and risky. World Foundation Models offer a scalable alternative by enabling realistic simulations of real-world environments. These models accelerate development and deployment in robotics, AVs, and other domains by reducing reliance on physical testing.

DataFeb 11

Scrape Data from Twitter (X.com) with Python in 2026

Modern social platforms, such as X.com, employ strict anti-scraping defenses, including CAPTCHA, rate limits, and IP blocking. These security measures make building a custom scraper from scratch both difficult and prone to frequent interruptions.

Agentic AIFeb 11

MCP Benchmark: Top MCP Servers for Web Access

We benchmarked 8 MCP servers across web search and extraction, as well as browser automation tasks, by running 4 different tasks 5 times on all suitable MCPs. We also performed a load test involving 250 concurrent AI agents.

Agentic AIFeb 11

AI Browser Security Risks: ChatGPT Atlas and Comet

Agentic AI browsers now handle your banking, emails, and private documents. A single malicious link can turn these assistants against you. Recent discoveries in Perplexity’s Comet browser reveal how attackers exploit prompt injection to steal credentials, exfiltrate data, and hijack authenticated sessions.