
Cem Dilmegani
Cem has been the principal analyst at AIMultiple for almost a decade.
Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]
Professional experience & achievements
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.
He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]
Research interests
Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.
Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.
Education
He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.
He holds an MBA degree from Columbia Business School in 2012.
Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.
External publications
- Cem Dilmegani (September 28, 2017). Post-AI Banking: Millions of jobs at risk as banks automate their core functions. International Banker
- Cem Dilmegani, Bengi Korkmaz, and Martin Lundqvist (December 1, 2014).Public-sector digitization: The trillion-dollar challenge.McKinsey & Company
Conference & other event presentations
- Real Estate and Technology, presented by Hofstra University’s Wilbur F. Breslin Center for Real Estate Studies and the Frank G. Zarb School of Business in 2023 and 2024.
- Radar AI session (June 22, 2023): "Increasing Data Science Impact with ChatGPT".
- Generative AI Atlanta meetup (March 10, 2023): Generative AI for Enterprise Technology.
Sources
- Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
- Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
- Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
- Science, Research and Innovation Performance of the EU, European Commission.
- EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
- Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
- We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.
Latest Articles from Cem
AI Presentation Maker: Gamma vs. Canva, vs. SlidesGO
We evaluated the top 5 AI presentation makers by examining their capabilities across 9 dimensions with 4 different prompts to assess how well they handle various scenarios: AI presentation maker benchmark results Review the methodology and evaluation criteria to understand how we determined these results.
Blackbaud AP Automation: 5 Software & Features Analyzed
Blackbaud offers accounting software, namely Financial Edge NXT. The product offers services in accounting such as: Although Financial Edge offers a wide range of solutions in the field of accounting, it can be improved with native software add-ons like Pairsoft for AP automation.
Axway MFT: A Comprehensive Guide
Managed File Transfer (MFT) plays a vital role within the file transfer solutions, catering to the secure and efficient movement of data across systems, crucial for businesses needing dependable, secure, and regulation-compliant data workflows. As business complexities and integration demands grow traditional protocols like FTP and HTTP fall short of current enterprise requirements.
Cloud Inference: 3 Powerful Reasons to Use
Deep learning models achieve high accuracy in tasks like speech recognition and image classification, often surpassing human performance. However, they require large training datasets and significant computational power. Cloud inference provides a scalable solution to handle these demands efficiently. Explore cloud inference, compare it to on-device inference, and highlight its benefits and challenges.
Top 5 Vulnerability Scanning Tools
Considering the variety of vulnerability scanning and management tools, businesses may face challenges in choosing the most suitable solution. When choosing a vulnerability scanning tool, users often consider the tools’: Considering these factors, we evaluated the leading vulnerability scanning tools and highlighted their key features.
What is Mandatory Access Control (MAC)?
Mandatory access control (MAC) is a security method that limits individuals’ capacity to grant or deny access to assets in a system. Mandatory access control helps organizations by enforcing strict security policies on access to resources.
Top 6 AS2 Software
Choosing the most cost-effective AS2 software can be challenging given the many options available. To assist, we’ve compiled a list of top managed file transfer tools that support AS2: What are our criteria for choosing the top As2 Software? Jscape MFT JSCAPE MFT Server supports AS2 file transfers, ensuring secure and standardized B2B data exchange.
Top 10 Application Security Tools: Features & Pricing
Application breaches represent 25% of all security incidents.. Based on our extensive research and technical reviewers’ experience, we selected the top 10 application security tools. Within each vendor’s section, we outlined our rationale for our selection.
20+ Application Security Statistics & Trends
We present an analysis of current statistics in the field of application security. Our focus is on providing a clear and concise overview of the latest data, reflecting key trends and insights in this area of cybersecurity. The statistics compiled here are drawn from reputable and up-to-date sources.
Linux Job Scheduler: Review, Guide & Alternatives
Linux job scheduler and ‘cron,’ a time-based job scheduler, are commonly used in Linux job scheduling.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.