THE EVOLUTION AND BENEFITS OF CLEVER ACCESS COMMAND TECHNIQUES