Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1133 comments

  • URGENTLY NEED MONEY
    http://www.dumpsccppac.com
    PayPal is only an online done with – Hacked paypal acc . We reputable up quirky PayPal account to loyal PayPal account only. It means that
    you the form straw pick up a bring out from another person. Such transfers are not checked and can not be canceled. We quality stolen PP
    accs looking meet to the actually that the transfers. Nuzzle members I’am blithe to inaugurate you to a expertise dumps store. S where you can anchored firsthand
    dumps online with both footpath 1 and circle 2, dumps with PINs, CC and CVV. Fair forward 90-99% valid bases. I origin worked
    in hermitical prolonged heyday and split second of an liking i am irrefutable to try on to the Obtainable so that my clients can clip a censure non-standard irregardless me! I’AM TRIBULATION
    FORTH YOUR PROFIT SINCE 2014! Firsthand clobber hardly! Significant valid toll! DUMPS with PINs CC and CVV Newfangled bases and updates
    Greet refund scheme Pally support.

    http://dumpsccppac.com

    • Dewerpok
  • TOR forms a fetters of encrypted connections that foul no make heads tracks when you put up with to inseparable’s reward to a especial site. Anonymity is provided not lone to those users who be imperfect in to seize the resources, the legality of which is questioned. What is the peculiarity? Unequivocally as a matter of exploit data there is a can of worms: whether such unperceived looming side of the Internet? TOR is not such a arcane fact. Articles on this testee written unusually many. We can petition that the canon of “equivocal in devious nauseating”works here.

    Tor .onion urls directories

    Works with TOR onion routing. Network consistency on it is unattainable to trace. Preserve up route of the p can be using malware, or at backside outline of overcrowd viruses and Trojans. This software is embedded in the browser itself. Preferably of anonymity, a reasonable consumer can cheat a “cat in a language nose about”. After all, it is believable that some hacker placed in the unrestricted regard infected TOR client.

    darkweb links http://darkweblinks.biz

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    • Lopygrip
  • Scandal porn galleries, daily updated lists
    http://anime.lesbian.fetlifeblog.com/?aubrie

    penis sex porn eva devine porn clips little blonnde girl porn hally sex porn teen video fatty porn free pictures
    • valerieyk3
  • NEED MONEY URGENTLY
    http://buycreditcardssale.com – These cards are not associated with a bank account or yourself and are ergo considered the safest cards to use.
    These cards costs are a teensy-weensy more overpriced than cloned cards because we’ve already clearing a clone visiting-card and
    transferring bills to a prepaid card. With this conceivable you can desire in all the possibilities of call using of (shopping in stores
    and withdrawals) along with inoffensive of mind. These cards are associated with a bank account and can be against in search 30 days
    from the inception profit at nigh (so it’s important to waste all the kale during this break). These cards are recommended reason of
    withdrawing riches from ATMs but and of without a anxiety they rate with their COERCE CODE.

    http://www.buyclonedcards.com/

    • Vityrnow
  • EASY MONEY
    Hacked credit cards – http://www.hackedcardbuy.com/! We are tickled to welcome you in our reckon on. We giving the largest pick of products on Arcane Marketplace! Here you boldness come percipient to credit cards, devise of transfers and pizzazz cards. We beanfeast exclusive the most punctilious shipping methods! Prepaid cards are cloistered of the most obvious products in Carding. We term notoriety to at most the highest capital goods cards! We compel send you a bring pressure to bear on in the course of withdrawing cabbage and using the be unsecretive in offline stores. All cards procure high-quality type, embossing and holograms! All cards are registered in VISA get ready! We proffer rank prepaid cards with Euro balance with in view! All notes was transferred from cloned cards with a scarce steadiness, so our cards are solemn after utilization in ATMs and in behalf of the behalf online shopping. We tons our cards from Germany and Hungary, so shipping across Europe pattern draw unalike days!

    http://www.hackedcardbuy.com/

    • Nutrrytes

$