
Cem Dilmegani
Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]
Professional experience & achievements
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]
Research interests
Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.
Education
He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.He holds an MBA degree from Columbia Business School in 2012.
Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.
External publications
- Cem Dilmegani, Post-AI Banking: Millions of jobs at risk as banks automate their core functions. International Banker.
- Cem Dilmegani, Bengi Korkmaz, and Martin Lundqvist (December 1, 2014).Public-sector digitization: The trillion-dollar challenge, McKinsey & Company.
Media, conference & other event presentations
- Answers to Korea24's questions on job loss due to AI, Korea24
- Real Estate and Technology, presented by Hofstra University’s Wilbur F. Breslin Center for Real Estate Studies and the Frank G. Zarb School of Business in 2023 and 2024.
- Radar AI session (June 22, 2023): "Increasing Data Science Impact with ChatGPT".
- Generative AI Atlanta meetup: Generative AI for Enterprise Technology.
Sources
- Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
- Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
- Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
- Science, Research and Innovation Performance of the EU, European Commission.
- EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
- Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
- We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.
Latest Articles from Cem
15 Best Open Source Web Crawlers: Python, Java, & JavaScript Options
Web crawlerss are specialized bots designed to navigate websites and extract data automatically and at scale. Instead of building these complex tools from scratch, developers can leverage open-source crawlers. These freely available and modifiable solutions provide a powerful foundation for creating scalable and highly customized data extraction pipelines.
Open Source UEBA Tools & Commercial Alternatives
At their core, UEBA solutions aim to identify patterns in data, whether from real-time streams or historical datasets. Open source UEBA tools After reviewing the documentation of each open-source UEBA frameworks/tool, I listed leading open-source behavior analytics technologies that provide standard SIEM-like capabilities (e.g., alerting, MITRE ATT&CK threat intelligence framework, API-based ingestion from data sources).
Top 7 Open Source Vulnerability Scanning Tools
Open-source vulnerability scanning tools offer potent features without a price tag, making them accessible to a wide range of users, from individual developers to large enterprises.
Top 10 Open source / Free DAST Tools Compared
We relied on our research on vulnerability scanning tools and DAST to select leading open-source DAST tools and free versions of proprietary DAST software. See our rationale by following the links on product names: As the cost and frequency of cyberattacks increase, businesses are increasingly adopting DAST tools to enhance their security posture.
Top 10 Free PAM Solutions
There are no plug-and-play and free PAM solutions for production environments. However, a few vendors offer free solutions with PAM capabilities for low-scale deployments. Some (e.g., Devolutions Password Hub) also have paid business plans with approval workflows/reporting.
Agentic CLI Tools Compared: Claude Code vs Cline vs Aider
Explore leading agentic CLI tools to streamline and elevate your code-editing workflow. AI coding tools can be grouped into three categories: Claude Code vs Cline vs Aider Tools are listed based on their GitHub scores: Claude Code Claude Code is a CLI interface that connects Claude models, including Claude 3.5, 3.7 and 4.
Top 5 Open Source DLP Software
Securing confidential business data is vital for organizations across all industries. While open-source DLP software presents viable solutions for data protection, larger enterprises often turn to closed-source DLP software solutions for enhanced functionality.
Optimizing Agentic Coding: How to use Claude Code
AI coding tools have become indispensable for many development tasks. In our tests, popular AI coding tools like Cursor have been responsible for generating over 70% of the code required for tasks.
How to Scrape Data from Twitter (X.com) with Python (No Twitter API)
Modern social platforms, such as X.com, employ strict anti-scraping defenses, including CAPTCHA, rate limits, and IP blocking. These security measures make building a custom scraper from scratch both difficult and prone to frequent interruptions.
Compare 10 Open Source MFA Tools
When starting your free and open source multi-factor authentication (MFA) implementation, consider: Features of open source MFA solutions → All tools (except LLDAP) offer compatibility with hardware tokens (e.g., YubiKey) and FIDO2 / WebAuthN passwordless API authentication protocol. FIDO2 does not use shared secrets, like passwords, it minimizes vulnerabilities associated with data breaches.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.