AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
706 Articles
Stay up-to-date on B2B Tech

Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

AISep 29

AGI Benchmark: Can AI Generate Economic Value

AI will have its greatest impact when AI systems start to create economic value autonomously. We benchmarked whether frontier models can generate economic value. We prompted them to build a new digital application (e.g., website or mobile app) that can be monetized with a SaaS or advertising-based model.

CybersecurityMar 11

Best 8 CSPM Pricing and Plans 

Listed CSPM pricing highly varies based on several factors, including: The starting price represents monthly payments for annual plans. Data is obtained from vendor websites, AWS Marketplace, and vendr. *Prisma Cloud is licensed using “Prisma Cloud Credits,” which can be purchased in increments of 100.

CybersecuritySep 15

Top 10 Multi-Factor Authentication (MFA) Solutions

Multi-factor authentication ensures that only authorized users can access accounts, sensitive information, or apps.

AISep 2

Best AI Code Editor: Cursor vs Windsurf vs Replit

Making an app without coding skills is highly trending right now. But can these tools successfully build and deploy an app? To answer this question, we benchmarked the following AI coding tools: Claude Code, Cline, Cursor, Replit and Windsurf Editor by Codeium.

CybersecurityMar 25

AI IPS: 6 Real-life Use Cases & Leading Tools

AI intrusion prevention systems (IPS) use machine learning algorithms and behavioral analytics to detect and prevent several cyber threats. These systems integrate AI with traditional IPS technologies, improving their ability to detect and mitigate attacks in real time. AI IPS can: 1.

AIJun 27

Top 4 AI Blog Generators Benchmarked: Quality & UX

We evaluated the top 4 AI blog generators across more than 10 dimensions, examining their performance in content quality, language and style, technical optimization, usability, and feature sets. See the leading solutions: Benchmark results See how these scores were generated and our methodology.

CybersecurityAug 1

BigID DSPM: 5 Alternatives, Features & Pricing

BigID is a DSPM vendor with data detection and response (DDR), data loss prevention (DLP), and file access intelligence (FAI) capabilities. User reviews show that BigID offers highly customizable data classifiers, however, it is inefficient in providing accurate data insights.

Enterprise SoftwareAug 12

Help Desk Case Studies: 9 Real-life Examples

Help desk software tracks customer questions and feedback to improve customer service. Here are real-life case studies illustrating how help desk software has been beneficial to businesses: 1. Eurail Eurail is a rail pass company serving travelers throughout 33 European countries on railroads and some shipping lines.

AIApr 7

Top AI Website Generators Benchmarked

To find the most helpful prompt-to-website creator, we benchmarked the following tools: If you need to learn about no-code AI website generator tools, you can follow the links: Benchmark results We conducted this benchmark using the latest versions of the tools available as of January 2025.

CybersecurityJul 25

Top 7 CSPM Use Cases with Real-life Examples

Cloud security posture management (CSPM) is a set of technologies, procedures, and practices that assist companies in identifying and resolving security risks associated with their cloud posture. Companies typically use cloud security posture management (CSPM) vendors to protect their data assets from malware, network threats, and data exfiltration.