Many years ago it was usual to hash passwords like this for saving in a database, for example:
$hashedPassword = MD5($password . $salt);
Hardware became faster, and the known fast hash functions like MD5, SHA-1, but also SHA-512 could be brute-forced much too fast. Nowadays [2012] it is possible to calculate about 8 Giga MD5 values with common hardware, to brute-force a whole english dictionary with 500'000 words, you need only a fraction of a millisecond!
That's why key-derivation functions like BCrypt and PBKDF2 where invented. They have a cost parameter and repeat the hashing many times (the cost factor determines the number of iterations). Each iteration will use the original salt to calculate a new hash-value, that's why you have to pass the salt separately to the function and cannot concatenate it before:
$hashedPassword = Bcrypt($password, $salt);
The linked article either wants to explain that a single hash calculation is not sufficient nowadays, or it want's to show that the salt cannot be concatenated with the password before passing it to the hash function.