Part of the Internet acronyms and lingo glossary:

On the Internet, bolt-on, perhaps inspired by add-on , is used to describe products and systems that can be quickly but securely attached to an existing Web site . The term most often describes some e-commerce solution for adding an online store to a Web site. A "bolt-on e-commerce solution" typically allows a Web site owner to create customized Web catalog pages, using a furnished template that includes a shopping cart approach for multiple item orders, and to have these pages hosted at the solution provider's server, where orders can be taken and reported to the Web site. Solution packages typically include the handling of credit-card applications and credit checking.

This was last updated in January 2006
Contributor(s): Kent Martindale
Posted by: Margaret Rouse

Related Terms

Definitions

  • wetware

    - Wetware refers to programmers, developers, systems administrators, cloud and IT architects and other employees that directly affect how servers, applications, networks and the rest of an IT system ... (SearchDataCenter.com)

  • dot-com bubble

    - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling co... (SearchCIO.com)

  • information superhighway (infobahn)

    - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchan... (SearchCIO.com)

Glossaries

  • Internet acronyms and lingo

    - Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Paranoid about protecting my MAC address--Please read my story

    I don't believe that's possible - protecting it. HOWEVER - To make use of your MAC address, the impersonator must be on the same (relatively) local subnet you are. My Comcast setup uses a subnet ...

  • Feedback wanted: How important is the network at your company?

    I have always seen the "powers that be" (those who sign the checks) tend to be quite pragmatic and expect information at that level. They need to know just enough so they feel justified putting out...

  • SFDC Software

    Your terminology and problem as posed cannot be answered. Saying that you have "an MIS system" could easily cover thousands of possibilities - which I'm not going to try and guess at which is what...

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.