Contact Us
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
360 Articles
Stay up-to-date on B2B Tech
Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Media, conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

AIJan 21

Large Language Model Evaluation in '26: 10+ Metrics & Methods

Large Language Model evaluation (i.e. LLM eval) is the multidimensional assessment of large language models (LLMs). Effective evaluation is crucial for selecting and optimizing LLMs. Enterprises have a range of base models and their variations to choose from, but achieving success is uncertain without precise performance measurement.

AIJan 21

Generative AI Copyright Concerns & 3 Best Practices in 2026

We analyzed tens of court cases and licensing deals to answer these key questions about copyright and generative AI. However, this is not legal advice. Copyright law varies by jurisdiction and is actively evolving. Consult qualified legal counsel for your specific situation. The Three Big Questions 1.

Enterprise SoftwareJan 21

Quantum Computing Stats: Forecasts & Facts for 2026 & Beyond

Quantum computing is an emerging field that has the potential to fundamentally change computing and build smarter machines. To understand the potential of quantum computing (QC), feel free to read our research on QC and its applications.

Agentic AIJan 21

Optimizing Agentic Coding: How to Use Claude Code in 2026?

AI coding tools have become indispensable for many development tasks. In our tests, popular AI coding tools like Cursor have been responsible for generating over 70% of the code required for tasks.

AIJan 21

Vibe Coding: Great for MVP But Not Ready for Production

Vibe coding is a new term that has entered our lives with AI coding tools like Cursor. It means coding by only prompting. We made several benchmarks to test the vibe coding tools, and with our experience, we decided to prepare this detailed guide.

AIJan 21

AI Presentation Maker: Gamma vs Google Slides

We evaluated the top 5 AI presentation makers across 9 dimensions with 4 different prompts to assess their context and prompt understanding, visual AI integration, and voice and brand style adaptation capabilities: AI presentation maker benchmark results See the methodology and evaluation criteria to understand how we determined these results.

AIJan 21

Generative AI Ethics: How to Manage Them

Generative AI raises important concerns about how knowledge is shared and trusted. Britannica, for instance, filed a lawsuit against Perplexity, alleging that the company illegally and knowingly copied Britannica’s human-verified content and misused its trademarks without permission. Explore what generative AI ethics concerns are and best practices for managing them. 1.

AIJan 21

LLM Pricing: Top 15+ Providers Compared

LLM API pricing can be complex and depends on your preferred usage. We analyzed 15+ LLMs and their pricing and performance: Hover over model names to view their benchmark results, real-world latency, and pricing, to assess each model’s efficiency and cost-effectiveness. Ranking: Models are ranked by their average position across all benchmarks.

Enterprise SoftwareJan 20

40 IoT Applications & Use Cases

Worldwide annual revenue on IoT in 2033 is expected to be $934B. IoT enables a myriad of different business applications. Knowing those IoT examples and use cases can help businesses integrate IoT technologies into their future investment decisions.

CybersecurityJan 20

6 Network Security Use Cases

Network security statistics reveal that cyber-attacks affected 350+ million individuals in the U.S. In this article, we explore network security use cases and real-world examples , from detecting insider threats to managing privileged access. For more on network security: 1.