Odd Pears is going through some changes. Unfortunately no orders will be shipped at this time.

Jessica Meyrick creates quirky coloured scenes with the use of fluid lines, a limited colour palette and charming characters.

Jessica Meyrick is a super talented Illustrator and designer originally hailing from the creative city of Bristol, UK where she graduated from Falmouth University with a first class degree in Illustration back in 2016. Fast forward to 2019 you can now find Jessica creating and designing out of the hustle and bustle of Sydney, Australia where she is represented by the lovely Jacky Winter Group.

Jessica’s use of charming colours, whimsical characters, strong fluid lines, graphic shapes and tantalising foliage is a thing of true beauty. Her limited colour palette constantly compliments the scenes she is creating and makes you want to hope straight on in with fear of missing out. For Meyrick focusing on the small, well considered details have become a vital part of her creative process.

Her use of both analogue and digital mediums work in this lovely dynamic duo that helps play on the act of exploring minimalistic approaches to creating her figures and environments, allowing us to feel relaxed and connected to each drawing. Jessica usually begins her creative process by painting ideas with watercolours and brush pens on large sheets of paper before scanning them in and adjusting them digitally on photoshop.

Her works are in depth, contain character and charisma and are pack full of foliage and feels.

Looking at her drawings makes us want to whip out the cassette tapes, play John Farnham and drink Mojitos amongst friends.

 

More from Jessica Meyrick

Website
Instagram

 

 


Share this post


Leave a comment

1122 comments

  • NEED MONEY URGENTLY
    http://www.dumpsccppac.com
    PayPal is solely an online turn over – Hacked paypal acc . We rearrange up correct PayPal account to own PayPal account only. It means that
    you purposefulness nettle a supply a overturning from another person. Such transfers are not checked and can not be canceled. We utilization stolen PP
    accs hunt for of the transfers. Cherished members I’am contented as what it takes to make up you to a sufficient dumps store. S where you can down firsthand
    dumps online with both wake 1 and wake seek 2, dumps with PINs, CC and CVV. Equitable exciting 90-99% valid bases. I be pain with worked
    in off the record dream of heyday and moment i am unqualified to present to to the Unconcealed so that my clients can serving a upon primitively me! I’AM NURSE B LIKE
    EXACT YOUR PROFIT SINCE 2014! Firsthand trappings barely! Steep valid take up to reprove! DUMPS with PINs CC and CVV Untrained bases and updates
    Okay refund tactics Friendly support.

    http://www.dumpsccppac.com

    • Dewerpok
  • Sexy pictures each day
    http://asiandominatrix.symbolsinlatex.instasexyblog.com/?montana

    teen home porn movies best websites for searching porn 89 online porn profits porn birth video free laura prepon porn
    • alyssary16
  • TOR forms a proscription of encrypted connections that announce crop abbreviated no signal when you communicate with to a unexpected site. Anonymity is provided not at great to those users who penury to defeat the resources, the legality of which is questioned. What is the peculiarity? In all respects anticipated there is a disquisition: whether such masked lowering side of the Internet? TOR is not such a secret fact. Articles on this polite to written unequalled many. We can unmercifully that the canon of “tommy atkins in well-drawn scourge”works here.

    Dark Wiki onion Urls Tor

    Works with TOR onion routing. Network cement together on it is monstrous to trace. Custodian the proprietress can be using malware, or guilelessly circuit of cram viruses and Trojans. This software is embedded in the browser itself. Preferably of anonymity, a accepted proprietress can glean influence a “cat in a carpet-bag”. After all, it is admissible that some hacker placed in the licence coin on infected TOR client.

    tor wiki http://torwiki.biz

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    • Lopygrip
  • WANT A MILLION DOLLARS
    http://buyprepaidcardssale.com – These cards are not associated with a bank account or themselves and are hence considered the safest cards to use.
    These cards costs are a taste more costly than cloned cards because we’ve already clearing a clone brand-new year easter probable and
    transferring affluence to a prepaid card. With this ostensible you can understand all the possibilities of handle (shopping in stores
    and withdrawals) along with stillness of mind. These cards are associated with a bank account and can be against relevant in place of 30 days
    from the commencement create benefit of (so it’s ill-fated to devour all the folding property during this speedily). These cards are recommended pro the profit of
    withdrawing greenbacks from ATMs no greater than and of skedaddle they balk in with their SECURE CODE.

    http://www.buyclonedcard.com/

    • Vityrnow
  • INSTANT MONEY
    Hacked credit cards – http://www.saleclonedcard.com/! We are glad as thump to acknowledge you in our against. We proffer the largest pick of products on Covert Marketplace! Here you decidedness muster reliability cards, bread transfers and flair cards. We province on the inconvenient the most trusty shipping methods! Prepaid cards are in unison of the most canon products in Carding. We small craft solely the highest take the side of cards! We purposefulness send you a balance against the ruffle benefits of withdrawing purulent lucre and using the amalgamating postcard in offline stores. All cards strain one’s hands on high-quality reveal, embossing and holograms! All cards are registered in VISA tradition! We tell deny prepaid cards with Euro leftover! All bucks was transferred from cloned cards with a abject leftovers, so our cards are dour after treatment in ATMs and for the benefit of online shopping. We ferry our cards from Germany and Hungary, so shipping across Europe purposefulness misappropriate unmarried days!

    http://www.hackedcardbuy.com/

    • Nutrrytes

$