{"grouped_entries":[{"entries":[{"url":"https://haskellweekly.news/issue/519.html","category":"Programming Languages","name":"Haskell Weekly"},{"url":"https://us11.campaign-archive.com/?u=a459401212599a54203d036ee&id=624ec2078e","name":"Laravel Daily","category":"Backend Web Frameworks"},{"url":"https://mailchi.mp/b80e4e2ac4b0/phpweekly-april-27th-21347398","category":"Programming Languages","name":"PHP Weekly"},{"name":"Elixir Weekly","category":"Programming Languages","url":"http://elixirweekly.net/issues/505"},{"name":"GraphQL Weekly","category":"Databases","url":"https://www.graphqlweekly.com/issues/411/#content"},{"name":"AI Weekly","category":"AI","url":"https://aiweekly.co/issues/481"},{"url":"https://www.itbrew.com/issues/latest","name":"IT Brew","category":"IT"},{"url":"https://www.emergingtechbrew.com/issues/latest","name":"Emerging Tech Brew","category":"AI"},{"url":"https://nodeweekly.com/issues/619","name":"Node Weekly","category":"JavaScript"}],"date":"Apr 09"},{"date":"Apr 08","entries":[{"url":"https://www.weekly.tf/p/issue-269-eks-auto-mode-unpacked-terraform-tips-from-the-trenches-managing-dns-and-domains-with-iac","name":"Terraform Weekly","category":"DevOps"},{"name":"Rust Weekly","category":"Programming Languages","url":"https://this-week-in-rust.org/blog/2026/04/08/this-week-in-rust-646/"},{"name":"Postgres Weekly","category":"Databases","url":"https://postgresweekly.com/issues/643"},{"category":"UI/Frontend","name":"Frontend Focus","url":"https://frontendfoc.us/issues/736"},{"url":"https://bsdweekly.com//issues/273","name":"BSD Weekly","category":"Open Source"}]},{"date":"Apr 07","entries":[{"url":"https://pycoders.com/issues/729","name":"PyCoder Weekly","category":"Programming Languages"},{"url":"https://newsletter.gamediscover.co/p/what-the-steam-fan-snapshot-tells","name":"GameDiscoverCo","category":"Game Dev"},{"url":"https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/","category":"Security","name":"Krebs on Security"},{"url":"https://www.elmweekly.nl/p/elm-weekly-issue-414","name":"Elm Weekly","category":"Programming Languages"},{"category":"IT","name":"Radar Trends","url":"https://www.oreilly.com/radar/radar-trends-to-watch-april-2026/"},{"url":"http://wpmail.me/newsletter/wpmail-me-issue760/","category":"WordPress","name":"wpMail"},{"name":"Javascript Weekly","category":"JavaScript","url":"https://javascriptweekly.com/issues/780"},{"url":"https://assets.infoq.com/newsletter/regular/en/newsletter_sample/newsletter_sample.html","category":"Software Engineering","name":"InfoQ Newsletter"},{"url":"https://clojure.org/news/2026/04/07/clojure-1-12-5-alpha1","category":"Programming Languages","name":"Clojure Deref"},{"url":"https://scalatimes.com/","category":"Programming Languages","name":"Scala Times"}]},{"entries":[{"category":"Programming Languages","name":"Rakudo Weekly News","url":"https://rakudoweekly.blog/2026/04/06/2026-14-trim-flip-flops/"},{"url":"https://jack-clark.net/2026/04/06/import-ai-452-scaling-laws-for-cyberwar-rising-tides-of-ai-automation-and-a-puzzle-over-gdp-forecasting/","category":"AI","name":"Import AI"},{"category":"UI/Frontend","name":"UX Design Weekly","url":"https://uxdesignweekly.com/issue-582/"},{"category":"Programming Languages","name":"Perl Weekly","url":"https://perlweekly.com/latest.html"},{"url":"https://rweekly.org/","category":"Programming Languages","name":"R Weekly"},{"url":"https://www.infoq.com/news/2026/04/java-news-roundup-mar30-2026/?utm_campaign=infoq_content&utm_source=infoq&utm_medium=feed&utm_term=Java-news","category":"Programming Languages","name":"Java News Roundup"},{"url":"https://sreweekly.com/sre-weekly-issue-511/","name":"SRE Weekly","category":"DevOps"},{"category":"Compilers","name":"LLVM Weekly","url":"https://llvmweekly.org/issue/640"}],"date":"Apr 06"},{"entries":[{"url":"https://www.humanityredefined.com/p/sync-565","category":"AI","name":"H+ AI Newsletter"},{"url":"https://sergeytihon.com/2026/04/05/f-weekly-14-2026-serde-fs-brings-compile-time-rpc-to-f/","name":"F# Weekly","category":"Programming Languages"},{"name":"Kotlin Weekly","category":"Programming Languages","url":"https://mailchi.mp/kotlinweekly/kotlin-weekly-505"},{"category":"AI","name":"Machine Learning Engineer Newsletter","url":"https://ethical.institute/mle/381.html"}],"date":"Apr 05"},{"date":"Apr 04","entries":[{"url":"https://cloudseclist.com/issues/issue-332/","category":"Security","name":"Cloud Security Reading List"},{"category":"Networking","name":"Serve The Home","url":"https://mailchi.mp/news/2026-04-04"}]},{"entries":[{"url":"https://www.devopsbulletin.com/p/digest-208-axios-supply-chain-attack","name":"DevOps Bulletin","category":"DevOps"},{"name":"Game Dev Digest","category":"Game Dev","url":"https://gamedevdigest.com/digests/issue-325-ui-worflows-patterns-and-more.html"},{"url":"https://us7.campaign-archive.com/?u=66fdd2122e968863d381a26e1&id=660d9b22e1","category":"Backend Web Frameworks","name":"ASP.NET Core News"},{"url":"https://www.meetingcpp.com/blog/blogroll/items/Meeting-Cpp-Blogroll-523.html","name":"Meeting C++ Weekly","category":"Programming Languages"},{"url":"https://softwareleadweekly.com/issues/697","category":"Software Engineering","name":"Software Lead Weekly"},{"url":"https://www.baeldung.com/java-weekly-640","name":"Java Weekly","category":"Programming Languages"}],"date":"Apr 03"},{"entries":[{"category":"Data Science","name":"Data News Hotlist","url":"https://datainnovation.org/2026/04/10-bits-the-data-news-hotlist-549/"},{"url":"https://haxe.io/roundups/733/","name":"Haxe Roundup","category":"Programming Languages"},{"url":"https://rubyweekly.com/issues/794","name":"Ruby Weekly","category":"Programming Languages"}],"date":"Apr 02"},{"date":"Apr 01","entries":[{"name":"Last Week in Kubernetes Development","category":"DevOps","url":"https://lwkd.info/2026/20260401"},{"url":"https://softwaretestingweekly.com/issues/307","category":"Testing","name":"Software Testing Weekly"}]},{"date":"Mar 31","entries":[{"category":"AI","name":"AI Ethics","url":"https://brief.montrealethics.ai/p/the-ai-ethics-brief-187-the-myth"},{"url":"https://www.feistyduck.com/newsletter/issue_135_web_pki_reimagined_with_merkle_tree_certificates","name":"Bulletproof TLS Newsletter","category":"Security"},{"url":"https://feedpress.me/link/24028/17312153/claude-codes-source-code-leaked-lets-have-fun-with-it","name":"CSS Weekly","category":"UI/Frontend"},{"url":"https://freek-dev.mailcoach.app/archive/16ef9508-ab0e-42fd-b378-8e6c53800e98","category":"Programming Languages","name":"PHP Freek Weekly"}]},{"date":"Mar 30","entries":[{"url":"http://www.JavaPerformanceTuning.com/news/news304.shtml","category":"Programming Languages","name":"Java Performance Tuning"}]},{"date":"Mar 29","entries":[{"name":"Azure Weekly","category":"DevOps","url":"https://azureweekly.info/issue-557.html"}]},{"date":"Mar 28","entries":[{"url":"https://tailwindweekly.com/issue-210/","name":"Tailwind Weekly","category":"UI/Frontend"}]},{"date":"Mar 27","entries":[{"name":"Changelog Weekly","category":"Software Engineering","url":"https://changelog.com/news/184"},{"url":"https://golangweekly.com/issues/595","category":"Programming Languages","name":"Go Weekly"},{"category":"Frontend Web Frameworks","name":"React Status","url":"https://react.statuscode.com/issues/468"},{"name":"The Repository Wordpress Newsletter","category":"WordPress","url":"https://www.therepository.email?mailpoet_router&endpoint=view_in_browser&action=view&data=WzM1OCwiNGI2ZWY3Y2JjZTcxIiwwLDAsMzkwOSwxXQ"},{"name":"Bug Bytes","category":"Security","url":"https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-234-march-2026"}]},{"date":"Mar 26","entries":[{"name":"API Developer Weekly","category":"Software Engineering","url":"https://mailchi.mp/48b56d560eff/key-takeaways-from-platform-summit-2024-api-developer-weekly-2679828"}]},{"date":"Mar 22","entries":[{"category":"UI/Frontend","name":"Figmalion Biweekly","url":"https://figmalion.com/issue/245"}]},{"entries":[{"url":"https://www.schneier.com/crypto-gram/archives/2026/0315.html","name":"Crypto-Gram","category":"Security"}],"date":"Mar 15"},{"date":"Mar 13","entries":[{"url":"https://iosdevweekly.com/issues/746/","category":"Mac","name":"iOS Dev Weekly"}]},{"date":"Feb 27","entries":[{"name":"API Security Newsletter","category":"Security","url":"https://apisecurity.io/issue-289-solarwinds-rce-supply-chain-api-exposure-sql-injection-and-identity-for-apis-in-the-age-of-agentic-ai/"}]},{"entries":[{"category":"Programming Languages","name":"Java Annotated Monthly","url":"https://blog.jetbrains.com/idea/2026/02/java-annotated-monthly-february-2026/"}],"date":"Feb 05"},{"entries":[{"category":"Security","name":"NCAS Vulnerability Summary","url":"https://www.cisa.gov/news-events/bulletins/sb26-040"}],"date":"Feb 02"},{"entries":[{"name":"Last Week in AWS","category":"DevOps","url":"https://www.lastweekinaws.com/newsletter/15259/"}],"date":"Jan 12"}],"categories":["All","AI","Backend Web Frameworks","Compilers","Data Science","Databases","DevOps","Frontend Web Frameworks","Game Dev","IT","JavaScript","Mac","Networking","Open Source","Programming Languages","Security","Software Engineering","Testing","UI/Frontend","WordPress"],"title":"ProgrammingNewsletters.com","year":2026,"api_path":"index.json","subtitle":"No email needed","source_url":"https://github.com/szTheory/programmingnewsletters.com","developer":"szTheory"}