
Cem Dilmegani
Cem has been the principal analyst at AIMultiple for almost a decade.
Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]
Professional experience & achievements
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.
He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]
Research interests
Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.
Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.
Education
He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.
He holds an MBA degree from Columbia Business School in 2012.
Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.
External publications
- Cem Dilmegani (September 28, 2017). Post-AI Banking: Millions of jobs at risk as banks automate their core functions. International Banker
- Cem Dilmegani, Bengi Korkmaz, and Martin Lundqvist (December 1, 2014).Public-sector digitization: The trillion-dollar challenge.McKinsey & Company
Conference & other event presentations
- Real Estate and Technology, presented by Hofstra University’s Wilbur F. Breslin Center for Real Estate Studies and the Frank G. Zarb School of Business in 2023 and 2024.
- Radar AI session (June 22, 2023): "Increasing Data Science Impact with ChatGPT".
- Generative AI Atlanta meetup (March 10, 2023): Generative AI for Enterprise Technology.
Sources
- Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
- Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
- Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
- Science, Research and Innovation Performance of the EU, European Commission.
- EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
- Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
- We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.
Latest Articles from Cem
10-Point Retail Audit Checklist with Case Studies
Retail audits are essential for consumer product goods (CPG) or fast-moving consumer goods (FMCG) companies to ensure success at their retail end. While some brands use retail and planogram audit services, others handle these audits internally. This article presents a 10-point checklist to help CPG brands in executing comprehensive retail audits.
Top 10 Open Source RBAC Tools
Based on their categories, features, and market presence I listed the top 10 open source RBAC tools that can help organizations restrict system access by granting grant permissions and privileges to users.
Top 4 Open Source DLP Software
Securing confidential business data is vital for organizations across all industries. While open-source DLP software presents viable solutions for data protection, larger enterprises often turn to closed-source DLP software solutions for enhanced functionality.
6 Real-life RBAC Examples
Network security statistics show that almost 2/3 of companies have 1,000+ high-value files accessible to each employee. Role-based access control (RBAC) systems (i.e. open source RBAC tools) can help organizations administer access controls to: Discover 6 real-life RBAC examples; their challenges, solutions, and benefits: 6 Real-life RBAC Examples 1.
6 Network Monitoring Use Cases with Real-Life Examples
Effective network monitoring is a cornerstone of efficient IT management, especially for complex, hybrid cloud environments. Through real-world examples, we will illustrate the practical benefits and applications of network monitoring: Core Network Monitoring Use Cases 1. Performance Optimization Performance is crucial for identifying bottlenecks and inefficiencies in network monitoring use cases.
DAST Software Pricing Comparison: Burp Suite, Nessus & More
With over 20 DAST tools on the market, selecting the most suitable one can be challenging due to their different features and pricing options. We’ve compiled publicly available information on vendors’ pricing strategies, making it easy to get an overview and estimate the likely costs you may face.
Top 15 DLP Statistics
Data from network security statistics reveals that the cost of an average data breach in the last year reached a record-breaking $4 million. To safeguard their data, businesses are leveraging solutions such as data loss prevention (DLP) software.
Top 5 AI Network Monitoring Use Cases and Real Life Examples
The integration of artificial intelligence (AI) into network monitoring enhances availability and performance. Here are options for you: Real-life Examples Case study #1 from Juniper Networks Source: AI-Native Networking Diagram Juniper Networks is a networking technology company offering solutions for enterprise and service provider networks.
Top 10 Free USB Blocking Software
Data loss prevention software uses USB blocking to prevent data breaches via data exfiltration through USBs and removable storage devices. Control over peripheral devices like USBs includes whitelisting and blacklisting, authorizing read-only access, and enforcing predefined policy rules.
AI Email Marketing Tools to Boost Performance
AI email marketing tools enable the creation of personalized email marketing messages with minimal manual effort. We identified the solutions below based on their capabilities in content generation, marketing automation, and optimization.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.