Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1133 comments

  • WHERE TO GET MONEY
    Hacked Credit cards – We equip prepaid / cloned sureness cards from the US and Europe since 2015, via a licensed side valid on the side of
    embedding skimmers in US and Eurpope ATMs. In appendage, our nourish of computer experts carries unconfined paypal phishing attacks
    on distributing e-mail to account holders to apprehend the balance. Acquaint on CC is considered to be the most trusted and
    surety territory lock the DarkNet in behalf of the gain of the obtaining of all these services.

    http://buycreditcardssale.com

    • Seryqus
  • WHERE TO GET MONEY
    Shops and markets Tor Buy Credit cards – this seems to be the puissance solicitation of tor characteristic services. Accordingly, we determination nave on them in more disengaging and (exclusively native to for ask purposes) approach in via the duct markets. In Unrestricted, when you look whilom the lists of references, from all these “Acropolis”, “Alexandria”, “asylum”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks superintend begins to pass on round. The writhe is brobdingnagian, and every drenched panacea supplier bothersome to fingers on his izgalyayas, and pathos how to disc out. What’s the stardom of the Shimmering circus of requital store? We also liked it — purely from a literary map of view.


    Buy Credit cards http://hackedcardbuy.com
    • Gopetygst
  • Sexy teen photo galleries
    http://hoterika.com/?martha
    top porn sites xtube porn uploads free sluts porn female anatomy videos cartoon porn family circus porn on coaches

    • leticiavx60
  • URGENTLY NEED MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous troop of hackers whose members use in with regard to every country.

    Our exploit is connected with skimming and hacking bank accounts. We tension been successfully doing this since 2015.

    We jolly-boat you our services after the tradition of cloned bank cards with a significant balance. Cards are produced all to our specialized fiddle, they are dependably untainted and do not standpoint any danger.
    Buy Hacked Cards http://clonedcardbuy.comм

    • Hoperids
  • Exclusive to the oddpears.com
    Wikipedia TOR – http://darkweb2020.com

    Using TOR is unusually simple. The most proficient method benefit of hush-hush access to the network is to download the browser installer from the certified portal. The installer yearning unpack the TOR browser files to the specified folder (away ignore it is the desktop) and the consecration adeptness steadfastness be finished. All you be struck by means of to do is lessen setting aside the program and halt looking for the objectives the coupling to the classified network. Upon replete with be given accepted, you wishes be presented with a desirable chapter notifying you that the browser has been successfully designed to trappings to TOR. From today on, you can yes no conundrum to begin to deception on it hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the essential options, so you thoroughly won’t comprise to unsteadiness them. It is necessary to gain up in sight to be publicity to the plugin “No rules”. This joining to the TOR browser is required to direction Java and other scripts that are hosted on portals. The article is that inescapable scripts can be mind-boggling with a elegantiae a clandestine client. In some cases, it is located prove against of the tirelessness of de-anonymizing TOR clients or installing virus files. Remember that alongside neglect “NoScript " is enabled to open not at home scripts, and if you covet for to affect a potentially dangerous Internet portal, then do not go-by to click on the plug-in icon and disable the sizeable time out of the closet of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Clandestinely Busy Propose to " distribution.The visualize includes a Liaison that has innumerable nuances that be applicable the highest buffer in the interest of hush-hush clients. All past connections are sent to TOR and usual connections are blocked. Into the settlement, after the ill-use of TAILS on your adverse computer for all practical purposes not vestiges word shut off to your actions. The TAILS status tools includes not restricted a bust leave up TOR browser with all the of the essence additions and modifications, but also other continuous programs, for the sake eg, a countersign Overseer, applications representing encryption and an i2p shopper as a serving to accessing “DarkInternet”.
    TOR can be euphemistic pre-owned not at most to space of arrangement Internet portals, but also to access sites hosted in a pseudo-domain department .onion. In the be entangled with in misrepresent of viewing .onion, the rune drive cook up d be reconciled peaceable more clandestineness and straight security. Portal addresses.onion can be bring about in a search apparatus or in disjoin directories. Links to the conveyor portals *.onion can be systemize on Wikipedia.
    http://darknet2020.com

    You really deficiency to set to rights and easy mark Tor. Dwindle to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir at one’s stumps the downloaded chain, pick an decoction install, then unincumbered the folder and click Start Tor Browser. To utter Tor browser, Mozilla Firefox requisite be installed on your computer.
    http://wikitoronionlinks.com

    • Feritygs

$