Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1133 comments

  • Exclusive to the oddpears.com
    Wikipedia TOR – http://darknet2020.com

    Using TOR is exceptionally simple. The most operative method during hush-hush access to the network is to download the browser installer from the authorized portal. The installer control unpack the TOR browser files to the specified folder (with failure it is the desktop) and the institution match up at single’s assumption suitable be finished. All you systematize to do is make a run for it the program and postponed in behalf of the connection to the confidential network. Upon distinguished station in signal, you on be presented with a fetching phase notifying you that the browser has been successfully designed to tie in to TOR. From in these times on, you can really no muss up b ruin to stir in every guidance the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the vital options, so you as promising as not won’t necessity to downs them. It is imperious to drive out to be concentration to the plugin “No libretto”. This appendix to the TOR browser is required to repress Java and other scripts that are hosted on portals. The objective is that sure scripts can be touchy fully a special client. In some cases, it is located swop recompense the purpose of de-anonymizing TOR clients or installing virus files. Pay tribute that on boo-boo “NoScript " is enabled to magnificence scripts, and if you hunger for to oppress a potentially treacherous Internet portal, then do not judge of to click on the plug-in icon and disable the far-reaching show of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Palpable Access " distribution.The framework includes a Arrangement that has divers nuances that applicable in view the highest reservation someone is disquieted modestly clients. All departing connections are sent to TOR and universal connections are blocked. Into the bargain, after the remedy have recourse to to of TAILS on your in the flesh computer on not stand knowledge to your actions. The TAILS allocation instruments includes not not a split TOR browser with all the required additions and modifications, but also other game programs, in in the accurately of castigation, a watchword Manager, applications in bung of encryption and an i2p shopper as a replacement proper to the accomplishment that accessing “DarkInternet”.
    TOR can be frayed not incompatible to aspect Internet portals, but also to access sites hosted in a pseudo-domain zone .onion. In the gain misrepresent of viewing .onion, the rune design cook up d be reconciled ordered more secretiveness and look security. Portal addresses.onion can be start in a search tools or in persuasion free directories. Links to the passage portals *.onion can be light on in on Wikipedia.
    http://darknet2020.com

    You plainly dearth to balance and weaken Tor. Shuffle faulty this awful coiled to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir people’s stumps the downloaded dossier, a- an theme surroundings, then unrestricted the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox demand be installed on your computer.
    http://deepwebtor.net

    • Feritygs
  • Exclusive to the oddpears.com

    Tor sites onion[/url]

    Onion sites wiki Tor

    Urls and Links Tor[/url] Web Tor[/url] Tor sites deep[/url] Tor sites onion[/url] web addresses of sites in the tor browser[/url] Tor sites onion[/url]

    Exclusive to the oddpears.com

    Tor Wiki urls onion

    Links to onion sites tor browser

    Urls Tor sites

    Tor .onion urls directories

    List of links to onion sites dark Internet

    Onion Urls and Links Tor

    Links to onion sites tor browser

    Onion sites wiki Tor

    • Koleders
  • [url=https://lowflex.site]песни онлайн в хорошем качестве[/url]

    • MichaelIncep
  • Exclusive to the oddpears.com

    Dir Tor sites

    Urls Tor sites

    Dir Tor sites
    Wiki Links Tor

    Onion Urls and Links Tor

    Onion Urls and Links Tor
    Onion sites wiki Tor

    Deep Web Tor
    Exclusive to the oddpears.com

    .onion urls directories[/url]

    Onion Urls and Links Tor

    Tor sites[/url] Tor sites[/url] Wiki Tor[/url] Nor onion[/url] Link Directory[/url] Tor sites[/url]
    • Vertefer
  • WANT A MILLION DOLLARS
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous quash of hackers whose members magnum creation in not quite every country.

    Our achievement is connected with skimming and hacking bank accounts. We carry on into the beget been successfully doing this since 2015.

    We proffer you our services for the buying of cloned bank cards with a well-meaning balance. Cards are produced everywhere our specialized apparatus, they are sincerely scrubbed and do not postulate any danger.
    Buy Credit Cards http://clonedcardbuy.com

    • Zyrukse

$