Cem Dilmegani
Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]
Professional experience & achievements
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]
Research interests
Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.
Education
He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.He holds an MBA degree from Columbia Business School in 2012.
Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.
External publications
- Cem Dilmegani, Post-AI Banking: Millions of jobs at risk as banks automate their core functions. International Banker.
- Cem Dilmegani, Bengi Korkmaz, and Martin Lundqvist (December 1, 2014).Public-sector digitization: The trillion-dollar challenge, McKinsey & Company.
Media, conference & other event presentations
- Answers to Korea24's questions on job loss due to AI, Korea24
- Real Estate and Technology, presented by Hofstra University’s Wilbur F. Breslin Center for Real Estate Studies and the Frank G. Zarb School of Business in 2023 and 2024.
- Radar AI session (June 22, 2023): "Increasing Data Science Impact with ChatGPT".
- Generative AI Atlanta meetup: Generative AI for Enterprise Technology.
Sources
- Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
- Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
- Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
- Science, Research and Innovation Performance of the EU, European Commission.
- EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
- Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
- We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.
Latest Articles from Cem
Agentic LLM Benchmark: Top 13 LLMs Compared
We benchmarked 13 LLM’s across 10 software development tasks by using Aider as an agentic CLI tool through OpenRouter. Each task requires generating a full-stack web application (FastAPI backend + frontend) and passing automated API and UI tests. Agentic LLM benchmark results Claude 4.5 Sonnet and GPT-5.
Top 10 Free PAM Solutions
There are no plug-and-play free PAM solutions for production environments. A few vendors offer free tools with PAM capabilities for low-scale deployments. Some, such as Devolutions Hub, also have paid business plans with approval workflows and reporting.
Top 8 Open Source RBAC Tools in 2026
Based on GitHub activity, update frequency, and deployment model, I listed the top 8 open-source RBAC tools that help organizations restrict system access by granting users permissions and privileges. This list covers 8 open-source RBAC tools across three categories: general-purpose authorization libraries and identity platforms with RBAC support, and Kubernetes-specific permission tools.
Network Monitoring Service Pricing Comparison in 2026
Network monitoring service pricing is shaped by several factors: how many devices you’re monitoring, what protocols and integrations you need, and whether you’re deploying on-premises or in the cloud. The five services below use different billing units, sensors, hosts, resources, or technicians, which makes direct price comparisons harder than they look.
Top 20 ITSM Case Studies
Leveraging IT Service Management (ITSM) tools is essential for businesses aiming to increase the efficiency of their IT operations and enhance service delivery.
Top 10 Voice Recognition Applications & Examples
If you’ve used virtual assistants like Alexa, Cortana, or Siri, you’re likely familiar with speech recognition and conversational AI. This technology enables users to interact with devices through verbal commands by converting spoken queries into machine-readable text. Explore the top 10 uses of voice recognition technology in voice search, customer service, healthcare, and other areas. 1.
AI Memory: Most Popular AI Models with the Best Memory
Smarter models often have worse memory. We tested 26 large language models in a 32-message business conversation to determine which actually retain information. AI memory benchmark results We tested 26 popular large language models through a simulated 32-message business conversation with 43 questions.
Top 20 Email Server Software: Features & Pricing
There are two main use cases for email servers. If you are looking for: Top 15 transactional email providers Sorting: The list ranks providers, with sponsored entries shown first along with their respective links. All non-sponsored providers are listed in order of the total number of B2B user reviews collected from G2 and Capterra.
Compare 10 Open Source MFA Tools
When starting your free and open source multi-factor authentication (MFA) implementation, consider: Features of open source MFA solutions All tools (except LDAP) support hardware tokens (e.g., YubiKey) and the FIDO2 / WebAuthN passwordless authentication protocol. FIDO2 does not use shared secrets, such as passwords; it minimizes the vulnerabilities associated with data breaches.
Top 20 Predictions from Experts on AI Job Loss
As a McKinsey consultant I spent a decade helping enterprises adopt technology including automation tech. 90% of all desk-based corporate roles that I have seen can be automated with the latest AI models combined with the right agent harness.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.