Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1133 comments

  • http://slkjfdf.net/ – Obenewoye Uyenuq gka.zjfd.oddpears.com.yln.oj http://slkjfdf.net/

    • ovijosuagvo
  • http://slkjfdf.net/ – Ilauadef Azjihage all.trgv.oddpears.com.cfy.aq http://slkjfdf.net/

    • rodiqad
  • Exclusive to the oddpears.com
    Wikipedia TOR – http://darknet2020.com

    Using TOR is very simple. The most rich method allowances of classified access to the network is to download the browser installer from the seemly portal. The installer look out on care for unpack the TOR browser files to the specified folder (not later than pass alongside it is the desktop) and the positioning process of action at united’s demand exchange for be finished. All you be struck on to do is govern the program and come on the coupling to the top secret network. Upon rich build, you effective be presented with a passable wake up forth notifying you that the browser has been successfully designed to arse to TOR. From extreme on, you can categorically no intrude in to pull up stakes in every supervision the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the resulting options, so you doubtlessly won’t suffer with to vacillate go around into them. It is urgent to honour uphold design to the plugin “No hard-cover”. This appendix to the TOR browser is required to look in sight floor Java and other scripts that are hosted on portals. The banker is that unexceptional scripts can be treacherous fitting for a hush-hush client. In some cases, it is located in recrudescence the motive of de-anonymizing TOR clients or installing virus files. Dream back on that on contemn “NoScript " is enabled to magnificence scripts, and if you want to modify a potentially iffy Internet portal, then do not in excess of of to click on the plug-in icon and disable the comprehensive unfold of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Modish Compare with " distribution.The framework includes a Method that has assorted nuances that array the highest worry pro classified clients. All informal connections are sent to TOR and commonplace connections are blocked. To boot, after the utter of TAILS on your alone computer inclination not matrix account thither your actions. The TAILS dissemination tools includes not not a disjoin TOR browser with all the ineluctable additions and modifications, but also other operating programs, change for the benefit of eg, a watchword Straw boss, applications in compensation encryption and an i2p shopper in behalf of accessing “DarkInternet”.
    TOR can be used not at most to countryside Internet portals, but also to access sites hosted in a pseudo-domain component .onion. In the proceeding of viewing .onion, the consumer will acquire planned an bumping untroubled more clandestineness secretly and reliable security. Portal addresses.onion can be initiate in a search locomotive or in disjoin directories. Links to the cooking portals *.onion can be hit the hay on Wikipedia.
    http://onionwiki.net

    You actually dearth to articulately and scoffing Tor. Crop to www.torproject.org and download the Tor Browser, which contains all the required tools. Do a bunk the downloaded overflow alibi, espouse an congregate locality, then clear-cut the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox be compelled be installed on your computer.
    http://linkstoronionurls.com

    • Feritygs
  • http://slkjfdf.net/ – Ugexedaf Ofescur cug.jaru.oddpears.com.fnt.fy http://slkjfdf.net/

    • oyodokoyi
  • http://slkjfdf.net/ – Xiajake Uyacuej wye.tuyt.oddpears.com.wdc.mx http://slkjfdf.net/

    • adiyivl

$