AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
722 Articles
Stay up-to-date on B2B Tech
Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, agentic AI, cybersecurity (including network security, application security) and data including web data.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and the tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Media, conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

DataNov 28

15 Best Open Source Web Crawlers: Python, Java, & JavaScript Options

Web crawlerss are specialized bots designed to navigate websites and extract data automatically and at scale. Instead of building these complex tools from scratch, developers can leverage open-source crawlers. These freely available and modifiable solutions provide a powerful foundation for creating scalable and highly customized data extraction pipelines.

CybersecurityNov 28

Open Source UEBA Tools & Commercial Alternatives

At their core, UEBA solutions aim to identify patterns in data, whether from real-time streams or historical datasets. Open source UEBA tools After reviewing the documentation of each open-source UEBA frameworks/tool, I listed leading open-source behavior analytics technologies that provide standard SIEM-like capabilities (e.g., alerting, MITRE ATT&CK threat intelligence framework, API-based ingestion from data sources).

CybersecurityNov 28

Top 7 Open Source Vulnerability Scanning Tools

Open-source vulnerability scanning tools offer potent features without a price tag, making them accessible to a wide range of users, from individual developers to large enterprises.

CybersecurityNov 28

Top 10 Open source / Free DAST Tools Compared

We relied on our research on vulnerability scanning tools and DAST to select leading open-source DAST tools and free versions of proprietary DAST software. See our rationale by following the links on product names: As the cost and frequency of cyberattacks increase, businesses are increasingly adopting DAST tools to enhance their security posture.

CybersecurityNov 28

Top 10 Free PAM Solutions

There are no plug-and-play and free PAM solutions for production environments. However, a few vendors offer free solutions with PAM capabilities for low-scale deployments. Some (e.g., Devolutions Password Hub)  also have paid business plans with approval workflows/reporting.

Agentic AINov 28

Agentic CLI Tools Compared: Claude Code vs Cline vs Aider

Explore leading agentic CLI tools to streamline and elevate your code-editing workflow. AI coding tools can be grouped into three categories: Claude Code vs Cline vs Aider Tools are listed based on their GitHub scores: Claude Code Claude Code is a CLI interface that connects Claude models, including Claude 3.5, 3.7 and 4.

CybersecurityNov 28

Top 5 Open Source DLP Software

Securing confidential business data is vital for organizations across all industries. While open-source DLP software presents viable solutions for data protection, larger enterprises often turn to closed-source DLP software solutions for enhanced functionality.

Agentic AINov 28

Optimizing Agentic Coding: How to use Claude Code

AI coding tools have become indispensable for many development tasks. In our tests, popular AI coding tools like Cursor have been responsible for generating over 70% of the code required for tasks.

DataNov 28

How to Scrape Data from Twitter (X.com) with Python (No Twitter API)

Modern social platforms, such as X.com, employ strict anti-scraping defenses, including CAPTCHA, rate limits, and IP blocking. These security measures make building a custom scraper from scratch both difficult and prone to frequent interruptions.

CybersecurityNov 28

Compare 10 Open Source MFA Tools

When starting your free and open source multi-factor authentication (MFA) implementation, consider: Features of open source MFA solutions → All tools (except LLDAP) offer compatibility with hardware tokens (e.g., YubiKey) and FIDO2 / WebAuthN passwordless API authentication protocol. FIDO2 does not use shared secrets, like passwords, it minimizes vulnerabilities associated with data breaches.