THE EVOLUTION AND ADVANTAGES OF CLEVER ACCESS COMMAND METHODS