AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
706 Articles
Stay up-to-date on B2B Tech

Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

AIMay 5

Cloud LLM vs Local LLMs: 3 Real-Life examples & benefits

In 2025, Cloud LLMs and Local LLMs are transforming business operations with unique advantages. Cloud LLMs, powered by advanced models like Grok 3, o3, and GPT-4.1, offer exceptional scalability and accessibility. Conversely, Local LLMs, driven by open-source models such as Qwen 3, Llama 4, and DeepSeek R1, ensure superior privacy and customization.

Enterprise SoftwareOct 1

Redwood-SAP Partnership: Clean Core Support for SAP Clients

With over 30 years of experience in automation, Redwood has worked alongside SAP to support a wide range of enterprise automation initiatives. This partnership has supported numerous enterprise automation projects. We aim to inform businesses about the services SAP users can access through Redwood, the history of this partnership, and the dynamics of their collaboration.

CybersecurityJul 25

Top 10 Network Security Policy Management Solutions

I have identified the top 10 (network security policy management) NSPM solutions based on my & other users’ experiences and vendor features.

Enterprise SoftwareJun 26

GPU Cluster: Key Things to Know & 5 Use Cases

A GPU cluster is a set of computers where each node is equipped with a Graphics Processing Unit (GPU). Computational demands are ever-rising, whether in cloud or traditional markets. In this context, having the right knowledge on GPU clusters is more important than before.

AISep 26

Large Multimodal Models (LMMs) vs LLMs

We evaluated the performance of Large Multimodal Models (LMMs) in financial reasoning tasks using a carefully selected dataset. By analyzing a subset of high-quality financial samples, we assess the models’ capabilities in processing and reasoning with multimodal data in the financial domain. The methodology section provides detailed insights into the dataset and evaluation framework employed.

CybersecurityAug 1

100+ Network Security Statistics

Network security is essential to maintain strong organizational resilience and understand network security use cases. Discover 100+ current network security data points derived from expert evaluation and market analysis: 1-Key network security statistics 1.

CybersecuritySep 30

Vulnerability Testing: Use Cases, Importance & Process

With cyber threats becoming increasingly common, it’s crucial for organizations to proactively enhance their defenses. One of the key strategies in achieving security is through vulnerability testing.

CybersecurityJul 25

Top 7 Penetration Testing Use Cases with Examples

According to IBM’s “Cost of a Data Breach Report,” the average financial impact of a data breach has surged to an alarming $4.45 million per incident. With the growing reliance on digital platforms and accelerated digital transformation, penetration testing has become an indispensable tool for businesses seeking to fortify their cybersecurity defenses.

CybersecurityOct 2

Top 10 Microsegmentation Tools

Microsegmentation tools help IT teams divide their networks into discrete controlled parts, making it difficult for outsiders to breach the entire network. For example, thanks to network segmentation TeamViewer’s breach did not impact customer systems.

DataJul 25

Unblocker& Proxy Benchmark: 7 Vendors vs ~5k URLs

AIMultiple web data collection benchmark analyzes leading web unblocker and proxy service providers including residential proxy networks.