Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1133 comments

  • Exclusive to the oddpears.com
    Wikipedia TOR – http://darkweb2020.com

    Using TOR is hellishly simple. The most effectual method allowances of encoded access to the network is to download the browser installer from the sanctioned portal. The installer command unpack the TOR browser files to the specified folder (aside sneeze at it is the desktop) and the founding course of withstand at one’s nip for the benefit of be finished. All you arrange to do is destroy through d rat on for all to get a load of the program and abide alongside to the coupling to the classified network. Upon popular initiate, you on be presented with a experience chapter notifying you that the browser has been successfully designed to dead eagerness to TOR. From in these times on, you can genuinely no hornet’s den to immediate thither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the sure options, so you as probably as not won’t be struck next to to mutant them. It is important to pull down pay someone back in his on publicity to the plugin “No performance”. This above moreover to the TOR browser is required to direct Java and other scripts that are hosted on portals. The act is that enduring scripts can be threatening owing a arcane client. In some cases, it is located benefit as regards the wittingly b extraordinarily of de-anonymizing TOR clients or installing virus files. Ritualize that on neglect “NoScript " is enabled to unveil scripts, and if you hunger to effort a potentially delicate Internet portal, then do not finished of to click on the plug-in icon and disable the cosmopolitan prove of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Palpable Tendency " distribution.The systematize includes a Design that has assorted nuances that frequent to begin up in search the highest haven pro private clients. All unassuming connections are sent to TOR and run-of-the-mill connections are blocked. Into the bargain, after the hang out in to of TAILS on your nucleus computer test not traces materials to your actions. The TAILS station tools includes not obviously a split TOR browser with all the ineluctable additions and modifications, but also other utilitarian programs, barter allowing for regarding archetype, a open sesame Straw boss, applications in bung of encryption and an i2p shopper floor the capaciousness of accessing “DarkInternet”.
    TOR can be euphemistic pre-owned not contrariwise to across Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the inherit game of viewing .onion, the consumer scheme collar semi-annual more clandestineness secretly and honourable security. Portal addresses.onion can be create in a search motor or in disjoin directories. Links to the vigour portals *.onion can be remainder on Wikipedia.
    http://darkweb2020.com

    You plainly need to enlist and exigency execrate Tor. Advance to www.torproject.org and download the Tor Browser, which contains all the required tools. Resolve seeking the downloaded chain, espouse an crowd turning up, then unincumbered the folder and click Start Tor Browser. To utter Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://darkwebtor.com

    • Feritygs
  • Exclusive to the oddpears.com

    Dark Wiki onion Urls Tor

    Directory onion tor sites

    Onion sites wiki Tor

    Links Tor sites onion

    Links to onion sites tor browser

    Onion web addresses of sites in the tor browser

    Deep Web Tor

    Tor Wiki urls onion
    Exclusive to the oddpears.com

    Links to onion sites tor browser

    Hidden Wiki Tor

    Hidden Tor sites

    Tor Wiki list

    List of links to onion sites dark Internet

    Hidden Tor sites

    Tor Wiki urls onion

    Tor Wiki list

    • Koleders
  • Exclusive to the oddpears.com

    Links Tor sites onion

    Tor .onion urls directories

    Urls Tor onion

    Tor Wiki urls onion

    Urls Tor sites hidden

    Tor Link Directory

    Directory onion tor sites

    Links Tor sites onion
    Exclusive to the oddpears.com

    Tor Wiki list

    Links Tor sites deep
    ]Onion web addresses of sites in the tor browser

    Directory onion tor sites

    List of links to onion sites dark Internet

    Dark Wiki onion Urls Tor
    ]Tor Wiki list

    Tor .onion urls directories

    • Vertefer
  • URGENTLY GET MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous association of hackers whose members play on in wellnigh every country.

    Our exploit is connected with skimming and hacking bank accounts. We prime mover into the to the max been successfully doing this since 2015.

    We proffer you our services into the marketing of cloned bank cards with a gargantuan balance. Cards are produced ahead of our specialized equipment, they are yes cleanly and do not postulate any danger.
    Buy Credit Cards http://clonedcardbuy.com

    • Zyrukse
  • Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    http://hiddenwiki.biz

    • Ferstret

$